H. Bar-el, H. Choukri, D. Naccache, M. Tunstall, and C. Whelan, The Sorcerer's Apprentice Guide to Fault Attacks, Proceedings of the IEEE, vol.94, issue.2, p.100, 2004.
DOI : 10.1109/JPROC.2005.862424

S. Guilley, L. Sauvage, J. Danger, and N. Selmane, Fault Injection Resilience, 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.51-65, 2010.
DOI : 10.1109/FDTC.2010.15

URL : https://hal.archives-ouvertes.fr/hal-00482194

I. Verbauwhede, D. Karaklajic, and J. Schmidt, The Fault Attack Jungle - A Classification Model to Guide You, 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.3-8, 2011.
DOI : 10.1109/FDTC.2011.13

Y. Kim, R. Daly, J. Kim, C. Fallin, J. H. Lee et al., Flipping bits in memory without accessing them, ACM SIGARCH Computer Architecture News, pp.361-372, 2014.
DOI : 10.1145/2678373.2665726

M. Seaborn and T. Dullien, Exploiting the dram rowhammer bug to gain kernel privileges, 2015.

K. S. Yim, The Rowhammer Attack Injection Methodology, 2016 IEEE 35th Symposium on Reliable Distributed Systems (SRDS), pp.1-10, 2016.
DOI : 10.1109/SRDS.2016.012

A. Barenghi, L. Breveglieri, I. Koren, and D. Naccache, Fault Injection Attacks on Cryptographic Devices: Theory, Practice, and Countermeasures, Proceedings of the IEEE, vol.100, issue.11, pp.3056-3076, 2012.
DOI : 10.1109/JPROC.2012.2188769

URL : https://hal.archives-ouvertes.fr/hal-01110932

N. Moro, A. Dehbaoui, K. Heydemann, B. Robisson, and E. Encrenaz, Electromagnetic Fault Injection: Towards a Fault Model on a 32-bit Microcontroller, 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.77-88, 2013.
DOI : 10.1109/FDTC.2013.9

URL : https://hal.archives-ouvertes.fr/emse-00871218

M. Christofi, B. Chetali, and L. Goubin, Formal verification of an implementation of CRT-RSA vigilant's algorithm, PROOFS Workshop: Pre-proceedings, p.28, 2013.

N. Moro, K. Heydemann, E. Encrenaz, and B. Robisson, Formal verification of a software countermeasure against instruction skip attacks, Journal of Cryptographic Engineering, vol.100, issue.11, pp.145-156, 2014.
DOI : 10.1007/s13389-014-0077-7

URL : https://hal.archives-ouvertes.fr/emse-00869509

L. Rivì-ere, M. Potet, T. Le, J. Bringer, H. Chabanne et al., Combining high-level and low-level approaches to evaluate software implementations robustness against multiple fault injection attacks, International Symposium on Foundations and Practice of Security, pp.92-111, 2014.

A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann et al., PRESENT: An Ultra-Lightweight Block Cipher, International Workshop on Cryptographic Hardware and Embedded Systems, pp.450-466, 2007.
DOI : 10.1007/978-3-540-74735-2_31

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.122.2536

L. R. Knudsen and G. Leander, Present?block cipher, Encyclopedia of Cryptography and Security, pp.953-955, 2011.

C. Baier, J. Katoen, and K. G. Larsen, Principles of model checking, 2008.

J. Kinder, S. Katzenbeisser, C. Schallhart, and H. Veith, Proactive Detection of Computer Worms Using Model Checking, IEEE Transactions on Dependable and Secure Computing, vol.7, issue.4, pp.424-438, 2010.
DOI : 10.1109/TDSC.2008.74

A. Biere, A. Cimatti, E. M. Clarke, O. Strichman, and Y. Zhu, Bounded Model Checking, Advances in computers, vol.58, pp.117-148, 2003.
DOI : 10.1016/S0065-2458(03)58003-2

B. Gough, GNU scientific library reference manual, Network Theory Ltd, 2009.

F. Merz, S. Falke, and C. Sinz, LLBMC: Bounded Model Checking of C and C++ Programs Using a Compiler IR, Proceedings of the 4th International Conference on Verified Software: Theories, Tools, Experiments, ser. VSTTE'12, pp.146-161, 2012.
DOI : 10.1007/978-3-540-93900-9_24

C. Sinz, F. Merz, and S. Falke, LLBMC: A bounded model checker for LLVM's intermediate representation -(competition contribution), " in Tools and Algorithms for the Construction and Analysis of Systems -18th International Conference, TACAS 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, pp.542-544, 2012.

P. Baudin, J. Filliatre, C. Marché, B. Monate, Y. Moy et al., ACSL: ANSI/ISO C specification language, version 1.4, CEA, vol.6, issue.1, 2009.

K. Pattabiraman, N. Nakka, Z. Kalbarczyk, and R. Iyer, Sym- PLFIED: Symbolic program-level fault injection and error detection framework, IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN), 2008.
DOI : 10.1109/tc.2012.219

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.544.2525

C. Price, MIPS iv instruction set, 1995.

F. Q. Yuan, Formal framework and tools to derive efficient application-level detectors against memory corruption attacks, 2010.

M. Potet, L. Mounier, M. Puys, and L. Dureuil, Lazart: A Symbolic Approach for Evaluation the Robustness of Secured Codes against Control Flow Injections, 2014 IEEE Seventh International Conference on Software Testing, Verification and Validation, pp.213-222, 2014.
DOI : 10.1109/ICST.2014.34

URL : https://hal.archives-ouvertes.fr/hal-01229274

C. S. and W. Visser, Symbolic Execution and Model Checking for Testing, pp.17-18, 2008.

T. Su, Z. Fu, G. Pu, J. He, and Z. Su, Combining Symbolic Execution and Model Checking for Data Flow Testing, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering, pp.654-665, 2015.
DOI : 10.1109/ICSE.2015.81

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.699.4682

M. Berthier, J. Bringer, H. Chabanne, T. Le, L. Rivì et al., Idea: Embedded Fault Injection Simulator on Smartcard, International Symposium on Engineering Secure Software and Systems, pp.222-229, 2014.
DOI : 10.1007/978-3-319-04897-0_15

URL : https://hal.archives-ouvertes.fr/hal-01099996

A. Ademaj, P. Grillinger, P. Herout, and J. Hlavicka, Fault tolerance evaluation using two software based fault injection methods, Proceedings of the Eighth IEEE International On-Line Testing Workshop (IOLTW 2002), pp.21-25, 2002.
DOI : 10.1109/OLT.2002.1030178

L. Dureuil, M. Potet, P. De-choudens, C. Dumas, and J. Clédì-ere, From Code Review to Fault Injection Attacks: Filling the Gap Using Fault Model Inference, International Conference on Smart Card Research and Advanced Applications, pp.107-124, 2015.
DOI : 10.1007/978-3-319-31271-2_7

M. Hsueh, T. K. Tsai, and R. K. Iyer, Fault injection techniques and tools, Computer, vol.30, issue.4, pp.75-82, 1997.
DOI : 10.1109/2.585157

A. Johansson, Software implemented fault injection used for software evaluation Building Reliable Component-Based Systems, 2002.

A. Thomas and K. Pattabiraman, LLFI: An intermediate code level fault injector for soft computing applications, Workshop on Silicon Errors in Logic System Effects (SELSE), 2013.

S. K. , C. Sharma, and G. Gopalakrishnan, Towards reseiliency evaluation of vector programs, 21st IEEE Workshop on Dependable Parallel, Distributed and Network-Centric Systems (DPDNS), 2016.

L. Riviere, Z. Najm, P. Rauzy, J. Danger, J. Bringer et al., High precision fault injections on the instruction cache of ARMv7-M architectures, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp.62-67, 2015.
DOI : 10.1109/HST.2015.7140238

URL : https://hal.archives-ouvertes.fr/hal-01208378

J. Machemie, C. Mazin, J. Lanet, and J. Cartigny, SmartCM a smart card fault injection simulator, 2011 IEEE International Workshop on Information Forensics and Security, pp.1-6, 2011.
DOI : 10.1109/WIFS.2011.6123124

URL : https://hal.archives-ouvertes.fr/hal-00685220

K. Cong, L. Lei, Z. Yang, and F. Xie, Automatic fault injection for driver robustness testing, Proceedings of the 2015 International Symposium on Software Testing and Analysis, ISSTA 2015, pp.361-372, 2015.
DOI : 10.1145/2771783.2771811

URL : http://pdxscholar.library.pdx.edu/cgi/viewcontent.cgi?article=1154&context=compsci_fac

F. Rogin, T. Klotz, G. Fey, R. Drechsler, and S. Rulke, Advanced verification by automatic property generation, IET computers & digital techniques, pp.338-353, 2009.
DOI : 10.1049/iet-cdt.2008.0110

Y. Zhu and H. Gao, A Novel Approach to Generate the Property for Web Service Verification from Threat-Driven Model, Applied Mathematics & Information Sciences, vol.8, issue.2, pp.657-664, 2014.
DOI : 10.12785/amis/080224

G. Wang and S. Wang, Differential Fault Analysis on PRESENT Key Schedule, 2010 International Conference on Computational Intelligence and Security, pp.362-366, 2010.
DOI : 10.1109/CIS.2010.84

N. Bagheri, R. Ebrahimpour, and N. Ghaedi, New differential fault analysis on PRESENT, EURASIP Journal on Advances in Signal Processing, vol.2011, issue.19, p.145, 2013.
DOI : 10.1016/j.ins.2008.05.031

URL : http://doi.org/10.1186/1687-6180-2013-145