Fault Injection is heavily being used in recent research to manipulate IoT and small consumer devices to access otherwise impossible features or areas. Finding possible vulnerabilities is usually the objective of a trial-and-error fault campaign.

With Fizzle, we aim to provide a tool for finding the parameters of possible fault injection attacks to reach a specific target instruction by combining a fuzzer with QEMU for the emulation of Fault Injection attacks for the first time. Additionally, we discuss essential problem statements for building search strategies for fault injection attacks with a fuzzer and extend QEMU to correctly emulate such attacks.