M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti, Control-flow integrity, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, pp.340-353, 2005.
DOI : 10.1145/1102120.1102165

J. Balasch, B. Gierlichs, and I. Verbauwhede, An in-depth and black-box characterization of the effects of clock glitches on 8-bit MCUs The 8th Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.105-114, 2011.

G. Barbu, G. Duc, and P. Hoogvorst, Java Card Operand Stack:??Fault Attacks, Combined Attacks and Countermeasures, 10th Smart Card Research and Advanced Application IFIP Conference, pp.297-313, 2011.
DOI : 10.1007/978-3-642-27257-8_19

URL : https://hal.archives-ouvertes.fr/hal-00692171

G. Barbu, H. Thiebeauld, and V. Guerin, Attacks on Java Card 3.0 Combining Fault and Logical Attacks, 9th Smart Card Research and Advanced Application IFIP Conference, pp.148-163, 2010.
DOI : 10.1007/978-3-642-12510-2_11

URL : https://hal.archives-ouvertes.fr/hal-00692165

A. Barenghi, L. Breveglieri, I. Koren, and D. Naccache, Fault Injection Attacks on Cryptographic Devices: Theory, Practice, and Countermeasures, Proceedings of the IEEE, vol.100, issue.11, pp.3056-3076, 2012.
DOI : 10.1109/JPROC.2012.2188769

URL : https://hal.archives-ouvertes.fr/hal-01110932

A. Barenghi and E. Trichina, Fault attacks on stream ciphers Fault Analysis in Cryptography, Information Security and Cryptography, pp.239-255, 2012.

P. Berthomé, K. Heydemann, X. Kauffmann-tourkestansky, and J. F. Lalande, High Level Model of Control Flow Attacks for Smart Card Functional Security, 2012 Seventh International Conference on Availability, Reliability and Security, pp.224-229, 2012.
DOI : 10.1109/ARES.2012.79

T. Bletsch, X. Jiang, and V. Freeh, Mitigating code-reuse attacks with control-flow locking, Proceedings of the 27th Annual Computer Security Applications Conference on, ACSAC '11, pp.353-362, 2011.
DOI : 10.1145/2076732.2076783

G. Bouffard, J. Iguchi-cartigny, and J. L. Lanet, Combined Software and Hardware Attacks on the Java Card Control Flow, 10th Smart Card Research and Advanced Application IFIP Conference, pp.283-296
DOI : 10.1007/978-3-642-27257-8_18

URL : https://hal.archives-ouvertes.fr/hal-00684616

G. Bouffard, B. N. Thampi, and J. L. Lanet, Detecting Laser Fault Injection for Smart Cards Using Security Automata, International Symposium on Security in Computing and Communications . CCIS, pp.18-29, 2013.
DOI : 10.1007/978-3-642-40576-1_3

URL : https://hal.archives-ouvertes.fr/hal-00966373

R. Brayton, G. Hachtel, A. Sangiovanni-vincentelli, F. Somenzi, A. Aziz et al., VIS: A system for verification and synthesis, Computer Aided Verification, pp.428-432, 1996.
DOI : 10.1007/3-540-61474-5_95

D. Ceara, Detecting Software Vulnerabilities -Static Taint Analysis, 2009.

Y. Chen, R. Venkatesan, M. Cary, R. Pang, S. Sinha et al., Oblivious Hashing: A Stealthy Software Integrity Verification Primitive, 5th International Workshop on Information Hiding, pp.400-414, 2002.
DOI : 10.1007/3-540-36415-3_26

A. Dehbaoui, A. P. Mirbaha, N. Moro, J. M. Dutertre, and A. Tria, Electromagnetic Glitch on the AES Round Counter, 4th International conference on Constructive Side-Channel Analysis and Secure Design, pp.17-31, 2013.
DOI : 10.1007/978-3-642-40026-1_2

URL : https://hal.archives-ouvertes.fr/emse-00837514

A. M. Fiskiran and R. B. Lee, Runtime execution monitoring (REM) to detect and prevent malicious code execution, IEEE International Conference on Computer Design: VLSI in Computers and Processors, 2004. ICCD 2004. Proceedings., pp.452-457, 2004.
DOI : 10.1109/ICCD.2004.1347961

O. Goloubeva, M. Rebaudengo, M. S. Reorda, and M. Violante, Soft-error detection using control flow assertions, Proceedings. 16th IEEE Symposium on Computer Arithmetic, pp.581-588, 2003.
DOI : 10.1109/DFTVS.2003.1250158

M. R. Guthaus, J. S. Ringenberg, D. Ernst, T. M. Austin, T. Mudge et al., MiBench: A free, commercially representative embedded benchmark suite, Proceedings of the Fourth Annual IEEE International Workshop on Workload Characterization. WWC-4 (Cat. No.01EX538), pp.3-14, 2001.
DOI : 10.1109/WWC.2001.990739

J. Iguchi-cartigny and J. L. Lanet, Evaluation of Countermeasures Against Fault Attacks on Smart Cards, International Journal of Security and Its Applications, vol.5, issue.2, pp.49-60, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00685237

M. Lackner, R. Berlach, W. Raschke, R. Weiss, and C. Steger, A Defensive Virtual Machine Layer to Counteract Fault Attacks on Java Cards, Information Security Theory and Practice Series, pp.82-97, 2013.
DOI : 10.1007/978-3-642-38530-8_6

URL : https://hal.archives-ouvertes.fr/hal-01485935

X. Leroy, Formal certification of a compiler back-end or: programming a compiler with a proof assistant, 33rd ACM symposium on Principles of Programming Languages, pp.42-54, 2006.
URL : https://hal.archives-ouvertes.fr/inria-00000963

I. Levin, A byte-oriented AES-256 implementation, 2007.

N. Moro, K. Heydemann, E. Encrenaz, and B. Robisson, Formal verification of a software countermeasure against instruction skip attacks, Journal of Cryptographic Engineering, vol.100, issue.11, pp.1-12, 2014.
DOI : 10.1007/s13389-014-0077-7

URL : https://hal.archives-ouvertes.fr/emse-00869509

N. Moro, A. Dehbaoui, K. Heydemann, B. Robisson, and E. Encrenaz, Electromagnetic Fault Injection: Towards a Fault Model on a 32-bit Microcontroller. In: Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.77-88, 2013.
URL : https://hal.archives-ouvertes.fr/emse-00871218

B. Nicolescu, Y. Savaria, and R. Velazco, SIED: software implemented error detection, Proceedings. 16th IEEE Symposium on Computer Arithmetic, pp.589-596, 2003.
DOI : 10.1109/DFTVS.2003.1250159

URL : https://hal.archives-ouvertes.fr/hal-00008192

N. Oh, P. Shirvani, and E. Mccluskey, Control-flow checking by software signatures, IEEE Transactions on Reliability, vol.51, issue.1, pp.111-122, 2002.
DOI : 10.1109/24.994926

I. Verbauwhede, D. Karaklaji´ckaraklaji´c, and J. M. Schmidt, The Fault Attack Jungle - A Classification Model to Guide You, 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.3-8, 2011.
DOI : 10.1109/FDTC.2011.13

Y. Xia, Y. Liu, H. Chen, and B. Zang, CFIMon: Detecting violation of control flow integrity using performance counters, IEEE/IFIP International Conference on Dependable Systems and Networks, pp.1-12, 2012.

F. Yamaguchi, C. Wressnegger, H. Gascon, and K. Rieck, Chucky, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.499-510, 2013.
DOI : 10.1145/2508859.2516665