A. Ademaj, P. Grillinger, P. Herout, and J. Hlavicka, Fault tolerance evaluation using two software based fault injection methods, Proceedings of the Eighth IEEE International, pp.21-25, 2002.

S. Anceau, P. Bleuet, J. Clédì-ere, L. Maingault, J. Rainard et al., Nanofocused x-ray beam to reprogram secure circuits, International Conference on Cryptographic Hardware and Embedded Systems, pp.175-188, 2017.

J. Balasch, B. Gierlichs, and I. Verbauwhede, An in-depth and black-box characterization of the effects of clock glitches on 8-bit mcus, Fault Diagnosis and Tolerance in Cryptography (FDTC), 2011 Workshop on, pp.105-114, 2011.

H. Bar-el, H. Choukri, D. Naccache, M. Tunstall, and C. Whelan, The sorcerer's apprentice guide to fault attacks, IACR Cryptology ePrint Archive, p.100, 2004.

A. Barenghi, G. M. Bertoni, L. Breveglieri, and G. Pelosi, A fault induction technique based on voltage underfeeding with application to attacks against aes and rsa, Journal of Systems and Software, vol.86, issue.7, pp.1864-1878, 2013.

M. Berthier, J. Bringer, H. Chabanne, T. Le, L. Rivì-ere et al., Idea: embedded fault injection simulator on smartcard, International Symposium on Engineering Secure Software and Systems, pp.222-229, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01099996

J. Breier, X. Hou, D. Jap, L. Ma, S. Bhasin et al., Practical fault attack on deep neural networks, 2018.

J. Carreira, H. Madeira, and J. G. Silva, Xception: Software fault injection and monitoring in processor functional units. Dependable Computing and Fault Tolerant Systems, vol.10, pp.245-266, 1998.

M. Christofi, B. Chetali, and L. Goubin, Formal verification of an implementation of CRT-RSA vigilant's algorithm, PROOFS Workshop: Pre-proceedings, p.28, 2013.

A. Dehbaoui, J. Dutertre, B. Robisson, P. Orsatelli, P. Maurine et al., Injection of transient faults using electromagnetic pulses-practical results on a cryptographic system, Cryptology EPrint Archive, p.123, 2012.

L. Dureuil, M. Potet, P. De-choudens, C. Dumas, and J. Clédì, From code review to fault injection attacks: Filling the gap using fault model inference, International Conference on Smart Card Research and Advanced Applications, pp.107-124, 2015.

R. Ecoffet, In-flight anomalies on electronic devices, Radiation Effects on Embedded Systems, pp.31-68, 2007.

T. Given-wilson, A. Heuser, N. Jafri, J. Lanet, and A. Legay, An automated and scalable formal process for detecting fault injection vulnerabilities in binaries, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01960940

T. Given-wilson, N. Jafri, J. Lanet, and A. Legay, An automated formal process for detecting fault injection vulnerabilities in binaries and case study on PRESENT, IEEE Trustcom/BigDataSE/ICESS, pp.293-300, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01629098

A. Höller, A. Krieg, T. Rauter, J. Iber, and C. Kreiner, QEMU-based fault injection for a system-level analysis of software countermeasures against fault attacks, Digital System Design (DSD), pp.530-533, 2015.

M. Hsueh, T. K. Tsai, and R. K. Iyer, Fault injection techniques and tools, Computer, vol.30, issue.4, pp.75-82, 1997.

A. Johansson, Software implemented fault injection used for software evaluation, 2002.

M. Kooli and G. D. Natale, A survey on simulation-based fault injection tools for complex systems, Design & Technology of Integrated Systems In Nanoscale Era (DTIS), pp.1-6, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01075473

H. M. Le, V. Herdt, D. Große, and R. Drechsler, Resilience evaluation via symbolic fault injection on intermediate code, Design, Automation & Test in Europe Conference & Exhibition (DATE), pp.845-850, 2018.

P. D. Marinescu and G. Candea, Lfi: A practical and general library-level fault injector, Dependable Systems & Networks, 2009. DSN'09. IEEE/IFIP International Conference on, pp.379-388, 2009.

T. C. May and M. H. Woods, A new physical mechanism for soft errors in dynamic memories, Reliability Physics Symposium, 1978. 16th Annual, pp.33-40, 1978.

N. Moro, Sécurisation de programmes assembleur face aux attaques visant les processeurs embarqués, 2014.

N. Moro, A. Dehbaoui, K. Heydemann, B. Robisson, and E. Encrenaz, Electromagnetic fault injection: towards a fault model on a 32-bit microcontroller, Fault Diagnosis and Tolerance in Cryptography (FDTC), 2013 Workshop on, pp.77-88, 2013.
URL : https://hal.archives-ouvertes.fr/emse-00871218

N. Moro, K. Heydemann, E. Encrenaz, and B. Robisson, Formal verification of a software countermeasure against instruction skip attacks, Journal of Cryptographic Engineering, vol.4, issue.3, pp.145-156, 2014.
URL : https://hal.archives-ouvertes.fr/emse-00869509

K. Pattabiraman, N. Nakka, Z. Kalbarczyk, and R. Iyer, SymPLFIED: Symbolic program-level fault injection and error detection framework, IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN), pp.472-481, 2008.

R. Piscitelli, S. Bhasin, and F. Regazzoni, Fault attacks, injection techniques and tools for simulation, Hardware Security and Trust, pp.27-47, 2017.

M. Potet, L. Mounier, M. Puys, and L. Dureuil, Lazart: A symbolic approach for evaluation the robustness of secured codes against control flow injections, 2014 IEEE Seventh International Conference on Software Testing, Verification and Validation, pp.213-222, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01229274

C. Price, MIPS iv instruction set, 1995.

R. Qiao and M. Seaborn, A new approach for rowhammer attacks, Hardware Oriented Security and Trust (HOST), pp.161-166, 2016.

J. Quisquater, Eddy current for magnetic analysis with active sensor, Proceedings of Esmart, pp.185-194, 2002.

L. Rivì-ere, J. Bringer, T. Le, and H. Chabanne, A novel simulation approach for fault injection resistance evaluation on smart cards, Software Testing, Verification and Validation Workshops (ICSTW), pp.1-8, 2015.

L. Rivì-ere, M. Potet, T. Le, J. Bringer, H. Chabanne et al., Combining high-level and low-level approaches to evaluate software implementations robustness against multiple fault injection attacks, International Symposium on Foundations and Practice of Security, pp.92-111, 2014.

C. Roscian, J. Dutertre, and A. Tria, Frontside laser fault injection on cryptosystems-application to the aes'last round, Hardware-Oriented Security and Trust (HOST), pp.119-124, 2013.
URL : https://hal.archives-ouvertes.fr/emse-01109128

J. Schmidt and M. Hutter, Optical and em fault-attacks on crt-based rsa: Concrete results. na, 2007.

M. Seaborn and T. Dullien, Exploiting the dram rowhammer bug to gain kernel privileges, 2015.

S. Skorobogatov, Optically enhanced position-locked power analysis, International Workshop on Cryptographic Hardware and Embedded Systems, pp.61-75, 2006.

S. Skorobogatov, Optical fault masking attacks, Fault Diagnosis and Tolerance in Cryptography (FDTC), 2010 Workshop on, pp.23-29, 2010.

, Trail of bits. Mc-semantics, 2016.

I. Verbauwhede, D. Karaklajic, and J. Schmidt, The fault attack jungle-a classification model to guide you, Fault Diagnosis and Tolerance in Cryptography (FDTC), pp.3-8, 2011.

G. Wang and S. Wang, Differential fault analysis on present key schedule, Computational Intelligence and Security (CIS), 2010 International Conference on, pp.362-366, 2010.

K. S. Yim, The rowhammer attack injection methodology, Reliable Distributed Systems (SRDS), 2016 IEEE 35th Symposium on, pp.1-10, 2016.

B. Yuce, P. Schaumont, and M. Witteman, Fault attacks on secure embedded software: Threats, design, and evaluation, Journal of Hardware and Systems Security, pp.1-20, 2018.