The Sorcerer's Apprentice Guide to Fault Attacks, Proceedings of the IEEE, vol.94, issue.2, p.100, 2004. ,
DOI : 10.1109/JPROC.2005.862424
Danger Jean-Luc, Selmane Nidhal. Fault injection resilience, pp.51-65, 2010. ,
The fault attack jungle-a classification model to guide you, pp.3-8, 2011. ,
Flipping bits in memory without accessing them: An experimental study of DRAM disturbance errors, pp.361-372, 2014. ,
Exploiting the DRAM rowhammer bug to gain kernel privileges, Black Hat, 2015. ,
The Rowhammer Attack Injection Methodology, pp.1-10 ,
Fault injection attacks on cryptographic devices: Theory, practice, and countermeasures, Proceedings of the IEEE, vol.2012100, issue.11, pp.3056-3076 ,
Electromagnetic fault injection: towards a fault model on a 32-bit microcontroller, pp.77-88 ,
Formal verification of an implementation of CRT-RSA Vigilant's algorithm, pp.28-2013 ,
Formal verification of a software countermeasure against instruction skip attacks, Journal of Cryptographic Engineering, vol.4, issue.3, pp.145-156, 2014. ,
An Automated Formal Process for Detecting Fault Injection Vulnerabilities in Binaries and Case Study on PRESENT, pp.293-300 ,
Chabanne Hervé, Puys Maxime Combining High-Level and Low-Level Approaches to Evaluate Software Implementations Robustness Against Multiple Fault Injection Attacks, pp.92-111 ,
PRESENT: An ultra-lightweight block cipher, pp.450-466, 2007. ,
PRESENT?Block Cipher, pp.953-955, 2011. ,
Wingers Louis. The SIMON and SPECK Families of Lightweight Block Ciphers Cryptology ePrint Archive, 2013. ,
Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault, WISTP, vol.6633, pp.224-233, 2011. ,
Frontside laser fault injection on cryptosystems-Application to the AES'last round, pp.119-124 ,
FISSC: A Fault Injection and Simulation Secure Collection, pp.3-11 ,
Lazart: A symbolic approach for evaluation the robustness of secured codes against control flow injections, pp.213-222 ,
Principles of model checking, 2008. ,
Differential fault intensity analysis on PRESENT and LED block ciphers, pp.174-188 ,
Differential fault analysis on PRESENT key schedule, pp.362-366, 2010. ,
Improved Differential Cryptanalysis of Round-Reduced Speck, Selected Areas in Cryptography -SAC 2014 -21st International Conference, pp.147-164, 2014. ,
Proactive detection of computer worms using model checking, IEEE Transactions on Dependable and Secure Computing, vol.7, issue.4, pp.424-438, 2010. ,
Bounded model checking Advances in computers, pp.117-148, 2003. ,
GNU scientific library reference manual, Network Theory Ltd, 2009. ,
LLBMC: Bounded Model Checking of C and C++ Programs Using a Compiler IR, pp.146-161, 2012. ,
LLBMC: A Bounded Model Checker for LLVM's Intermediate Representation -(Competition Contribution), pp.542-544, 2012. ,
Fault-Injection-Tool. https://github.com/nisrine/Fault-Injection-Tool, 2017. ,
Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT, Information Security and Privacy, 14th Australasian Conference Proceedings, Lecture Notes in Computer Science, pp.90-107, 2009. ,
Differential Analysis of Block Ciphers SIMON and SPECK, pp.546-570 ,
DOI : 10.1007/978-3-662-46706-0_28
SymPLFIED: Symbolic program-level fault injection and error detection framework, pp.472-481, 2008. ,
Idea: embedded fault injection simulator on smartcard, pp.222-229 ,
Fault tolerance evaluation using two software based fault injection methods, pp.21-25, 2002. ,
From Code Review to Fault Injection Attacks: Filling the Gap Using Fault Model Inference, pp.107-124 ,