The second group is called Microprobing.
In this case it requires to direct access to the chip surface to observe,
manipulate, and interact with the chip, and they are also invasive attacks.
The third category is called a Fault generation.
In this case, the attacker will generate, create f,
Fault, normally a faulty input, or make the chip run eh,
of normal environment conditions, and in the hope that the chip will malfunction,
to leak information, or give the attacker additional access to the system.
Depending how the fault is generated,
the attack can be either be semi-invasive or non-invasive.
And Side-channel attack, which we'll discuss next week,
they are normally non-invasive attacks, and this type of attack has two phases.
First, the attacker, while monitoring,
will measure a chip's physical characteristics, such as power, current,
timing, EM radiation, etc, during the chip's normal operation mode.
And then, with the data collected,
they will perform a data analysis to learn the hidden information.