Fault tolerance evaluation using two software based fault injection methods, Proceedings of the Eighth IEEE International, pp.21-25, 2002. ,
Nanofocused x-ray beam to reprogram secure circuits, International Conference on Cryptographic Hardware and Embedded Systems, pp.175-188, 2017. ,
An in-depth and black-box characterization of the effects of clock glitches on 8-bit mcus, Fault Diagnosis and Tolerance in Cryptography (FDTC), 2011 Workshop on, pp.105-114, 2011. ,
The sorcerer's apprentice guide to fault attacks, IACR Cryptology ePrint Archive, p.100, 2004. ,
A fault induction technique based on voltage underfeeding with application to attacks against aes and rsa, Journal of Systems and Software, vol.86, issue.7, pp.1864-1878, 2013. ,
Idea: embedded fault injection simulator on smartcard, International Symposium on Engineering Secure Software and Systems, pp.222-229, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01099996
, Practical fault attack on deep neural networks, 2018.
Xception: Software fault injection and monitoring in processor functional units. Dependable Computing and Fault Tolerant Systems, vol.10, pp.245-266, 1998. ,
Formal verification of an implementation of CRT-RSA vigilant's algorithm, PROOFS Workshop: Pre-proceedings, p.28, 2013. ,
Injection of transient faults using electromagnetic pulses-practical results on a cryptographic system, Cryptology EPrint Archive, p.123, 2012. ,
From code review to fault injection attacks: Filling the gap using fault model inference, International Conference on Smart Card Research and Advanced Applications, pp.107-124, 2015. ,
In-flight anomalies on electronic devices, Radiation Effects on Embedded Systems, pp.31-68, 2007. ,
An automated and scalable formal process for detecting fault injection vulnerabilities in binaries, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01960940
An automated formal process for detecting fault injection vulnerabilities in binaries and case study on PRESENT, IEEE Trustcom/BigDataSE/ICESS, pp.293-300, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01629098
QEMU-based fault injection for a system-level analysis of software countermeasures against fault attacks, Digital System Design (DSD), pp.530-533, 2015. ,
Fault injection techniques and tools, Computer, vol.30, issue.4, pp.75-82, 1997. ,
Software implemented fault injection used for software evaluation, 2002. ,
A survey on simulation-based fault injection tools for complex systems, Design & Technology of Integrated Systems In Nanoscale Era (DTIS), pp.1-6, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01075473
Resilience evaluation via symbolic fault injection on intermediate code, Design, Automation & Test in Europe Conference & Exhibition (DATE), pp.845-850, 2018. ,
Lfi: A practical and general library-level fault injector, Dependable Systems & Networks, 2009. DSN'09. IEEE/IFIP International Conference on, pp.379-388, 2009. ,
A new physical mechanism for soft errors in dynamic memories, Reliability Physics Symposium, 1978. 16th Annual, pp.33-40, 1978. ,
Sécurisation de programmes assembleur face aux attaques visant les processeurs embarqués, 2014. ,
Electromagnetic fault injection: towards a fault model on a 32-bit microcontroller, Fault Diagnosis and Tolerance in Cryptography (FDTC), 2013 Workshop on, pp.77-88, 2013. ,
URL : https://hal.archives-ouvertes.fr/emse-00871218
Formal verification of a software countermeasure against instruction skip attacks, Journal of Cryptographic Engineering, vol.4, issue.3, pp.145-156, 2014. ,
URL : https://hal.archives-ouvertes.fr/emse-00869509
SymPLFIED: Symbolic program-level fault injection and error detection framework, IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN), pp.472-481, 2008. ,
Fault attacks, injection techniques and tools for simulation, Hardware Security and Trust, pp.27-47, 2017. ,
Lazart: A symbolic approach for evaluation the robustness of secured codes against control flow injections, 2014 IEEE Seventh International Conference on Software Testing, Verification and Validation, pp.213-222, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01229274
MIPS iv instruction set, 1995. ,
A new approach for rowhammer attacks, Hardware Oriented Security and Trust (HOST), pp.161-166, 2016. ,
Eddy current for magnetic analysis with active sensor, Proceedings of Esmart, pp.185-194, 2002. ,
A novel simulation approach for fault injection resistance evaluation on smart cards, Software Testing, Verification and Validation Workshops (ICSTW), pp.1-8, 2015. ,
Combining high-level and low-level approaches to evaluate software implementations robustness against multiple fault injection attacks, International Symposium on Foundations and Practice of Security, pp.92-111, 2014. ,
Frontside laser fault injection on cryptosystems-application to the aes'last round, Hardware-Oriented Security and Trust (HOST), pp.119-124, 2013. ,
URL : https://hal.archives-ouvertes.fr/emse-01109128
Optical and em fault-attacks on crt-based rsa: Concrete results. na, 2007. ,
Exploiting the dram rowhammer bug to gain kernel privileges, 2015. ,
Optically enhanced position-locked power analysis, International Workshop on Cryptographic Hardware and Embedded Systems, pp.61-75, 2006. ,
Optical fault masking attacks, Fault Diagnosis and Tolerance in Cryptography (FDTC), 2010 Workshop on, pp.23-29, 2010. ,
, Trail of bits. Mc-semantics, 2016.
The fault attack jungle-a classification model to guide you, Fault Diagnosis and Tolerance in Cryptography (FDTC), pp.3-8, 2011. ,
Differential fault analysis on present key schedule, Computational Intelligence and Security (CIS), 2010 International Conference on, pp.362-366, 2010. ,
The rowhammer attack injection methodology, Reliable Distributed Systems (SRDS), 2016 IEEE 35th Symposium on, pp.1-10, 2016. ,
Fault attacks on secure embedded software: Threats, design, and evaluation, Journal of Hardware and Systems Security, pp.1-20, 2018. ,