I also read the following papers while writing https://crystalfree.atlassian.net/wiki/spaces/SaraPhD/pages/2337996801:
Fault Injection Attacks on Cryptographic Devices: Theory, Practice, and Countermeasures
https://www.sciencedirect.com/science/article/pii/S0167404821002959
Faults, Injection Methods, and Fault Attacks
How Practical Are Fault Injection Attacks, Really?