Continuing our 7-part series on attacking the Renesas RH850. Work conducted by Ibrahima Keita. Background In the previous blog post, we gave a brief overview of our target, the Renesas RH850, and the various security features. In this blog post, we will go over two techniques we can use to potentially bypass them: fault injection,... » Read More