Control-flow integrity, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, pp.340-353, 2005. ,
DOI : 10.1145/1102120.1102165
An in-depth and black-box characterization of the effects of clock glitches on 8-bit MCUs The 8th Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.105-114, 2011. ,
Java Card Operand Stack:??Fault Attacks, Combined Attacks and Countermeasures, 10th Smart Card Research and Advanced Application IFIP Conference, pp.297-313, 2011. ,
DOI : 10.1007/978-3-642-27257-8_19
URL : https://hal.archives-ouvertes.fr/hal-00692171
Attacks on Java Card 3.0 Combining Fault and Logical Attacks, 9th Smart Card Research and Advanced Application IFIP Conference, pp.148-163, 2010. ,
DOI : 10.1007/978-3-642-12510-2_11
URL : https://hal.archives-ouvertes.fr/hal-00692165
Fault Injection Attacks on Cryptographic Devices: Theory, Practice, and Countermeasures, Proceedings of the IEEE, vol.100, issue.11, pp.3056-3076, 2012. ,
DOI : 10.1109/JPROC.2012.2188769
URL : https://hal.archives-ouvertes.fr/hal-01110932
Fault attacks on stream ciphers Fault Analysis in Cryptography, Information Security and Cryptography, pp.239-255, 2012. ,
High Level Model of Control Flow Attacks for Smart Card Functional Security, 2012 Seventh International Conference on Availability, Reliability and Security, pp.224-229, 2012. ,
DOI : 10.1109/ARES.2012.79
Mitigating code-reuse attacks with control-flow locking, Proceedings of the 27th Annual Computer Security Applications Conference on, ACSAC '11, pp.353-362, 2011. ,
DOI : 10.1145/2076732.2076783
Combined Software and Hardware Attacks on the Java Card Control Flow, 10th Smart Card Research and Advanced Application IFIP Conference, pp.283-296 ,
DOI : 10.1007/978-3-642-27257-8_18
URL : https://hal.archives-ouvertes.fr/hal-00684616
Detecting Laser Fault Injection for Smart Cards Using Security Automata, International Symposium on Security in Computing and Communications . CCIS, pp.18-29, 2013. ,
DOI : 10.1007/978-3-642-40576-1_3
URL : https://hal.archives-ouvertes.fr/hal-00966373
VIS: A system for verification and synthesis, Computer Aided Verification, pp.428-432, 1996. ,
DOI : 10.1007/3-540-61474-5_95
Detecting Software Vulnerabilities -Static Taint Analysis, 2009. ,
Oblivious Hashing: A Stealthy Software Integrity Verification Primitive, 5th International Workshop on Information Hiding, pp.400-414, 2002. ,
DOI : 10.1007/3-540-36415-3_26
Electromagnetic Glitch on the AES Round Counter, 4th International conference on Constructive Side-Channel Analysis and Secure Design, pp.17-31, 2013. ,
DOI : 10.1007/978-3-642-40026-1_2
URL : https://hal.archives-ouvertes.fr/emse-00837514
Runtime execution monitoring (REM) to detect and prevent malicious code execution, IEEE International Conference on Computer Design: VLSI in Computers and Processors, 2004. ICCD 2004. Proceedings., pp.452-457, 2004. ,
DOI : 10.1109/ICCD.2004.1347961
Soft-error detection using control flow assertions, Proceedings. 16th IEEE Symposium on Computer Arithmetic, pp.581-588, 2003. ,
DOI : 10.1109/DFTVS.2003.1250158
MiBench: A free, commercially representative embedded benchmark suite, Proceedings of the Fourth Annual IEEE International Workshop on Workload Characterization. WWC-4 (Cat. No.01EX538), pp.3-14, 2001. ,
DOI : 10.1109/WWC.2001.990739
Evaluation of Countermeasures Against Fault Attacks on Smart Cards, International Journal of Security and Its Applications, vol.5, issue.2, pp.49-60, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00685237
A Defensive Virtual Machine Layer to Counteract Fault Attacks on Java Cards, Information Security Theory and Practice Series, pp.82-97, 2013. ,
DOI : 10.1007/978-3-642-38530-8_6
URL : https://hal.archives-ouvertes.fr/hal-01485935
Formal certification of a compiler back-end or: programming a compiler with a proof assistant, 33rd ACM symposium on Principles of Programming Languages, pp.42-54, 2006. ,
URL : https://hal.archives-ouvertes.fr/inria-00000963
A byte-oriented AES-256 implementation, 2007. ,
Formal verification of a software countermeasure against instruction skip attacks, Journal of Cryptographic Engineering, vol.100, issue.11, pp.1-12, 2014. ,
DOI : 10.1007/s13389-014-0077-7
URL : https://hal.archives-ouvertes.fr/emse-00869509
Electromagnetic Fault Injection: Towards a Fault Model on a 32-bit Microcontroller. In: Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.77-88, 2013. ,
URL : https://hal.archives-ouvertes.fr/emse-00871218
SIED: software implemented error detection, Proceedings. 16th IEEE Symposium on Computer Arithmetic, pp.589-596, 2003. ,
DOI : 10.1109/DFTVS.2003.1250159
URL : https://hal.archives-ouvertes.fr/hal-00008192
Control-flow checking by software signatures, IEEE Transactions on Reliability, vol.51, issue.1, pp.111-122, 2002. ,
DOI : 10.1109/24.994926
The Fault Attack Jungle - A Classification Model to Guide You, 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.3-8, 2011. ,
DOI : 10.1109/FDTC.2011.13
CFIMon: Detecting violation of control flow integrity using performance counters, IEEE/IFIP International Conference on Dependable Systems and Networks, pp.1-12, 2012. ,
Chucky, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.499-510, 2013. ,
DOI : 10.1145/2508859.2516665