The Sorcerer's Apprentice Guide to Fault Attacks, Proceedings of the IEEE, vol.94, issue.2, p.100, 2004. ,
DOI : 10.1109/JPROC.2005.862424
Fault Injection Resilience, 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.51-65, 2010. ,
DOI : 10.1109/FDTC.2010.15
URL : https://hal.archives-ouvertes.fr/hal-00482194
The Fault Attack Jungle - A Classification Model to Guide You, 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.3-8, 2011. ,
DOI : 10.1109/FDTC.2011.13
Flipping bits in memory without accessing them, ACM SIGARCH Computer Architecture News, pp.361-372, 2014. ,
DOI : 10.1145/2678373.2665726
Exploiting the dram rowhammer bug to gain kernel privileges, 2015. ,
The Rowhammer Attack Injection Methodology, 2016 IEEE 35th Symposium on Reliable Distributed Systems (SRDS), pp.1-10, 2016. ,
DOI : 10.1109/SRDS.2016.012
Fault Injection Attacks on Cryptographic Devices: Theory, Practice, and Countermeasures, Proceedings of the IEEE, vol.100, issue.11, pp.3056-3076, 2012. ,
DOI : 10.1109/JPROC.2012.2188769
URL : https://hal.archives-ouvertes.fr/hal-01110932
Electromagnetic Fault Injection: Towards a Fault Model on a 32-bit Microcontroller, 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.77-88, 2013. ,
DOI : 10.1109/FDTC.2013.9
URL : https://hal.archives-ouvertes.fr/emse-00871218
Formal verification of an implementation of CRT-RSA vigilant's algorithm, PROOFS Workshop: Pre-proceedings, p.28, 2013. ,
Formal verification of a software countermeasure against instruction skip attacks, Journal of Cryptographic Engineering, vol.100, issue.11, pp.145-156, 2014. ,
DOI : 10.1007/s13389-014-0077-7
URL : https://hal.archives-ouvertes.fr/emse-00869509
Combining high-level and low-level approaches to evaluate software implementations robustness against multiple fault injection attacks, International Symposium on Foundations and Practice of Security, pp.92-111, 2014. ,
PRESENT: An Ultra-Lightweight Block Cipher, International Workshop on Cryptographic Hardware and Embedded Systems, pp.450-466, 2007. ,
DOI : 10.1007/978-3-540-74735-2_31
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.122.2536
Present?block cipher, Encyclopedia of Cryptography and Security, pp.953-955, 2011. ,
Principles of model checking, 2008. ,
Proactive Detection of Computer Worms Using Model Checking, IEEE Transactions on Dependable and Secure Computing, vol.7, issue.4, pp.424-438, 2010. ,
DOI : 10.1109/TDSC.2008.74
Bounded Model Checking, Advances in computers, vol.58, pp.117-148, 2003. ,
DOI : 10.1016/S0065-2458(03)58003-2
GNU scientific library reference manual, Network Theory Ltd, 2009. ,
LLBMC: Bounded Model Checking of C and C++ Programs Using a Compiler IR, Proceedings of the 4th International Conference on Verified Software: Theories, Tools, Experiments, ser. VSTTE'12, pp.146-161, 2012. ,
DOI : 10.1007/978-3-540-93900-9_24
LLBMC: A bounded model checker for LLVM's intermediate representation -(competition contribution), " in Tools and Algorithms for the Construction and Analysis of Systems -18th International Conference, TACAS 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, pp.542-544, 2012. ,
ACSL: ANSI/ISO C specification language, version 1.4, CEA, vol.6, issue.1, 2009. ,
Sym- PLFIED: Symbolic program-level fault injection and error detection framework, IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN), 2008. ,
DOI : 10.1109/tc.2012.219
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.544.2525
MIPS iv instruction set, 1995. ,
Formal framework and tools to derive efficient application-level detectors against memory corruption attacks, 2010. ,
Lazart: A Symbolic Approach for Evaluation the Robustness of Secured Codes against Control Flow Injections, 2014 IEEE Seventh International Conference on Software Testing, Verification and Validation, pp.213-222, 2014. ,
DOI : 10.1109/ICST.2014.34
URL : https://hal.archives-ouvertes.fr/hal-01229274
Symbolic Execution and Model Checking for Testing, pp.17-18, 2008. ,
Combining Symbolic Execution and Model Checking for Data Flow Testing, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering, pp.654-665, 2015. ,
DOI : 10.1109/ICSE.2015.81
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.699.4682
Idea: Embedded Fault Injection Simulator on Smartcard, International Symposium on Engineering Secure Software and Systems, pp.222-229, 2014. ,
DOI : 10.1007/978-3-319-04897-0_15
URL : https://hal.archives-ouvertes.fr/hal-01099996
Fault tolerance evaluation using two software based fault injection methods, Proceedings of the Eighth IEEE International On-Line Testing Workshop (IOLTW 2002), pp.21-25, 2002. ,
DOI : 10.1109/OLT.2002.1030178
From Code Review to Fault Injection Attacks: Filling the Gap Using Fault Model Inference, International Conference on Smart Card Research and Advanced Applications, pp.107-124, 2015. ,
DOI : 10.1007/978-3-319-31271-2_7
Fault injection techniques and tools, Computer, vol.30, issue.4, pp.75-82, 1997. ,
DOI : 10.1109/2.585157
Software implemented fault injection used for software evaluation Building Reliable Component-Based Systems, 2002. ,
LLFI: An intermediate code level fault injector for soft computing applications, Workshop on Silicon Errors in Logic System Effects (SELSE), 2013. ,
Towards reseiliency evaluation of vector programs, 21st IEEE Workshop on Dependable Parallel, Distributed and Network-Centric Systems (DPDNS), 2016. ,
High precision fault injections on the instruction cache of ARMv7-M architectures, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp.62-67, 2015. ,
DOI : 10.1109/HST.2015.7140238
URL : https://hal.archives-ouvertes.fr/hal-01208378
SmartCM a smart card fault injection simulator, 2011 IEEE International Workshop on Information Forensics and Security, pp.1-6, 2011. ,
DOI : 10.1109/WIFS.2011.6123124
URL : https://hal.archives-ouvertes.fr/hal-00685220
Automatic fault injection for driver robustness testing, Proceedings of the 2015 International Symposium on Software Testing and Analysis, ISSTA 2015, pp.361-372, 2015. ,
DOI : 10.1145/2771783.2771811
URL : http://pdxscholar.library.pdx.edu/cgi/viewcontent.cgi?article=1154&context=compsci_fac
Advanced verification by automatic property generation, IET computers & digital techniques, pp.338-353, 2009. ,
DOI : 10.1049/iet-cdt.2008.0110
A Novel Approach to Generate the Property for Web Service Verification from Threat-Driven Model, Applied Mathematics & Information Sciences, vol.8, issue.2, pp.657-664, 2014. ,
DOI : 10.12785/amis/080224
Differential Fault Analysis on PRESENT Key Schedule, 2010 International Conference on Computational Intelligence and Security, pp.362-366, 2010. ,
DOI : 10.1109/CIS.2010.84
New differential fault analysis on PRESENT, EURASIP Journal on Advances in Signal Processing, vol.2011, issue.19, p.145, 2013. ,
DOI : 10.1016/j.ins.2008.05.031
URL : http://doi.org/10.1186/1687-6180-2013-145