C. Bar-el-hagai, N. Hamid, T. David, W. Michael, and . Claire, The Sorcerer's Apprentice Guide to Fault Attacks, Proceedings of the IEEE, vol.94, issue.2, p.100, 2004.
DOI : 10.1109/JPROC.2005.862424

G. Sylvain and S. Laurent, Danger Jean-Luc, Selmane Nidhal. Fault injection resilience, pp.51-65, 2010.

V. Ingrid, K. Dusko, and S. , The fault attack jungle-a classification model to guide you, pp.3-8, 2011.

K. Yoongu, D. Ross, and K. Jeremie, Flipping bits in memory without accessing them: An experimental study of DRAM disturbance errors, pp.361-372, 2014.

S. Mark and D. Thomas, Exploiting the DRAM rowhammer bug to gain kernel privileges, Black Hat, 2015.

S. Yim-keun, The Rowhammer Attack Injection Methodology, pp.1-10

B. Barenghi-alessandro, K. Luca, N. Israel, and . David, Fault injection attacks on cryptographic devices: Theory, practice, and countermeasures, Proceedings of the IEEE, vol.2012100, issue.11, pp.3056-3076

M. Nicolas, D. Amine, H. Karine, R. Bruno, and E. Emmanuelle, Electromagnetic fault injection: towards a fault model on a 32-bit microcontroller, pp.77-88

C. Maria, C. Boutheina, and G. Louis, Formal verification of an implementation of CRT-RSA Vigilant's algorithm, pp.28-2013

M. Nicolas, H. Karine, E. Emmanuelle, and R. Bruno, Formal verification of a software countermeasure against instruction skip attacks, Journal of Cryptographic Engineering, vol.4, issue.3, pp.145-156, 2014.

G. Thomas, J. Nisrine, L. Jean-louis, and L. Axel, An Automated Formal Process for Detecting Fault Injection Vulnerabilities in Binaries and Case Study on PRESENT, pp.293-300

R. Lionel, P. Marie-laure, L. Thanh-ha, and B. Julien, Chabanne Hervé, Puys Maxime Combining High-Level and Low-Level Approaches to Evaluate Software Implementations Robustness Against Multiple Fault Injection Attacks, pp.92-111

B. Andrey, K. Lars, R. , and L. Gregor, PRESENT: An ultra-lightweight block cipher, pp.450-466, 2007.

K. Lars, R. , and L. Gregor, PRESENT?Block Cipher, pp.953-955, 2011.

S. Beaulieu-ray, S. Douglas, T. Jason, W. Stefan, and . Bryan, Wingers Louis. The SIMON and SPECK Families of Lightweight Block Ciphers Cryptology ePrint Archive, 2013.

T. Michael, M. Debdeep, and A. Subidh, Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault, WISTP, vol.6633, pp.224-233, 2011.

R. Cyril, D. Jean-max, and T. Assia, Frontside laser fault injection on cryptosystems-Application to the AES'last round, pp.119-124

D. Louis, P. Guillaume, P. Marie-laure, L. Thanh-ha, C. Aude et al., FISSC: A Fault Injection and Simulation Secure Collection, pp.3-11

P. Marie-laure, M. Laurent, P. Maxime, and D. Louis, Lazart: A symbolic approach for evaluation the robustness of secured codes against control flow injections, pp.213-222

B. Christel, K. Joost-pieter, and L. Kim-guldstrand, Principles of model checking, 2008.

Y. Ghalaty-nahid-farhady, S. Bilgiday, and . Patrick, Differential fault intensity analysis on PRESENT and LED block ciphers, pp.174-188

W. Gaoli and W. Shaohui, Differential fault analysis on PRESENT key schedule, pp.362-366, 2010.

D. Itai, Improved Differential Cryptanalysis of Round-Reduced Speck, Selected Areas in Cryptography -SAC 2014 -21st International Conference, pp.147-164, 2014.

K. Johannes, K. Stefan, S. Christian, and V. Helmut, Proactive detection of computer worms using model checking, IEEE Transactions on Dependable and Secure Computing, vol.7, issue.4, pp.424-438, 2010.

C. Biere-armin, C. Alessandro, M. Edmund, S. Ofer, and Z. Yunshan, Bounded model checking Advances in computers, pp.117-148, 2003.

G. Brian, GNU scientific library reference manual, Network Theory Ltd, 2009.

M. Florian, F. Stephan, and S. Carsten, LLBMC: Bounded Model Checking of C and C++ Programs Using a Compiler IR, pp.146-161, 2012.

S. Carsten, M. Florian, and F. Stephan, LLBMC: A Bounded Model Checker for LLVM's Intermediate Representation -(Competition Contribution), pp.542-544, 2012.

G. Thomas and J. Nisrine, Fault-Injection-Tool. https://github.com/nisrine/Fault-Injection-Tool, 2017.

Ö. Onur, V. Kerem, T. Cihangir, and K. Çelebi, Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT, Information Security and Privacy, 14th Australasian Conference Proceedings, Lecture Notes in Computer Science, pp.90-107, 2009.

R. Biryukov-alex, V. Arnab, and . Vesselin, Differential Analysis of Block Ciphers SIMON and SPECK, pp.546-570
DOI : 10.1007/978-3-662-46706-0_28

P. Karthik, N. Nithin, K. Zbigniew, and I. Ravishankar, SymPLFIED: Symbolic program-level fault injection and error detection framework, pp.472-481, 2008.

B. Maël, B. Julien, C. Hervé, L. Thanh-ha, R. Lionel et al., Idea: embedded fault injection simulator on smartcard, pp.222-229

A. Astrit, G. Petr, H. Pavel, and H. Jan, Fault tolerance evaluation using two software based fault injection methods, pp.21-25, 2002.

D. Louis, P. Marie-laure, C. Philippe, D. Cécile, and C. Jessy, From Code Review to Fault Injection Attacks: Filling the Gap Using Fault Model Inference, pp.107-124