How Practical Are Fault Injection Attacks