alexzumalde asked 14 years ago

I am studying on the application of techniques of defensive programming in embedded software.
I am developing an experiment that is based on a doctoral project that made use of radio frequencies to stimulate faults (bit flips) in the processing of a micro chip. At the end of the work can be identified compared the efficiency of each of the defensive programming techniques applied.
I’m thinking of using heat to produce errors because of the simplicity. I read a paper where a student from Princeton broke the security of the Java virtual machine using this technique. What do you know about this?