R. J. Anderson and M. G. Kuhn, Tamper Resistance ? a Cautionary Note, The Second USENIX Workshop on Electronic Commerce Proceedings, pp.1-11, 1996.

R. J. Anderson and M. G. Kuhn, Low cost attacks on tamper resistant devices, Security Protocols, 5th International Workshop, pp.125-136, 1997.
DOI : 10.1007/BFb0028165

. Atmel, ATmega163(L) Datasheet (revision E), 2003.

. Atmel, Atmel AVR 8-bit Instruction Set Manual (revision 0856J), 2014.

J. Balasch, B. Gierlichs, and I. Verbauwhede, An In-depth and Black-box Characterization of the Effects of Clock Glitches on 8-bit MCUs, 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.105-114, 2011.
DOI : 10.1109/FDTC.2011.9

H. Bar-el, H. Choukri, D. Naccache, M. Tunstall, and C. Whelan, The Sorcerer's Apprentice Guide to Fault Attacks, Proceedings of the IEEE, vol.94, issue.2, pp.370-382, 2006.
DOI : 10.1109/JPROC.2005.862424

B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai et al., On the (Im)possibility of Obfuscating Programs, Advances in Cryptology -CRYPTO 2001, pp.1-18, 2001.

A. Barenghi, G. Bertoni, E. Parrinello, and G. Pelosi, Low Voltage Fault Attacks on the RSA Cryptosystem, 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pp.23-31, 2009.
DOI : 10.1109/FDTC.2009.30

URL : http://home.deib.polimi.it/barenghi/files/FDTC2009.pdf

A. Barenghi, G. M. Bertoni, L. Breveglieri, M. Pellicioli, and G. Pelosi, Low voltage fault attacks to AES, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp.7-12, 2010.
DOI : 10.1109/HST.2010.5513121

G. T. Becker, W. Burleson, and C. Paar, Side-channel watermarks for embedded software, 2011 IEEE 9th International New Circuits and systems conference, 2011.
DOI : 10.1109/NEWCAS.2011.5981323

URL : http://www.emsec.rub.de/media/crypto/veroeffentlichungen/2014/02/27/BeckerNewcasCameraReady.pdf

G. T. Becker, D. Strobel, C. Paar, and W. Burleson, Detecting Software Theft in Embedded Systems: A Side-Channel Approach, IEEE Transactions on Information Forensics and Security, vol.7, issue.4, pp.1144-1154, 2012.
DOI : 10.1109/TIFS.2012.2191964

D. Boneh, R. A. Demillo, and R. J. Lipton, On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract), Advances in Cryptology - EUROCRYPT '97, pp.37-51, 1997.

C. S. Collberg and C. D. Thomborson, Software watermarking, Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '99, pp.311-324, 1999.
DOI : 10.1145/292540.292569

F. Durvaux, B. Gérard, S. Kerckhof, F. Koeune, and F. Standaert, Intellectual Property Protection for Integrated Systems Using Soft Physical Hash Functions, Information Security Applications -13th International Workshop, pp.208-225, 2012.
DOI : 10.1007/978-3-642-35416-8_15

URL : http://perso.uclouvain.be/fstandae/PUBLIS/118.pdf

D. Gusfield, Algorithms on Strings, Trees, and Sequences, 1999.
DOI : 10.1017/CBO9780511574931

P. C. Kocher, J. Jaffe, and B. Jun, Differential Power Analysis, pp.388-397, 1999.
DOI : 10.1007/3-540-48405-1_25

T. Korak and M. Hoefler, On the Effects of Clock and Power Supply Tampering on Two Microcontroller Platforms, 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.8-17, 2014.
DOI : 10.1109/FDTC.2014.11

J. Nagra, C. D. Thomborson, and C. S. Collberg, A Functional Taxonomy for Software Watermarking, In: ACSC. pp, pp.177-186, 2002.

D. Oswald, GIAnT: Generic Implementation ANalysis Toolkit, SourceForge, 2014.

J. Quisquater and D. Samyde, Automatic Code Recognition for Smartcards Using a Kohonen Neural Network, Proceedings of the Fifth Smart Card Research and Advanced Application Conference, p.2, 2002.

S. P. Skorobogatov and R. J. Anderson, Optical Fault Induction Attacks, Cryptographic Hardware and Embedded Systems -CHES 2002, pp.2-12, 2002.
DOI : 10.1007/3-540-36400-5_2

B. Smyth, Computing Patterns in Strings, 2003.
DOI : 10.1109/iccsit.2009.5234544

D. Strobel, F. Bache, D. Oswald, F. Schellenberg, and C. Paar, SCANDALee: A Side-ChANnel-based DisAssembLer using Local Electromagnetic Emanations, Design, Automation & Test in Europe Conference & Exhibition (DATE), 2015, 2015.
DOI : 10.7873/DATE.2015.0639