T. Given-wilson, N. Jafri, J. Lanet, and A. Legay, An automated formal process for detecting fault injection vulnerabilities in binaries and case study on PRESENT, 2017 IEEE Trustcom/BigDataSE/ICESS, pp.293-300, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01629098

M. Potet, L. Mounier, M. Puys, and L. Dureuil, Lazart: A symbolic approach for evaluation the robustness of secured codes against control flow injections, 2014 IEEE Seventh International Conference on Software Testing, Verification and Validation, pp.213-222, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01229274

K. Pattabiraman, N. Nakka, Z. Kalbarczyk, and R. Iyer, SymPLFIED: Symbolic program-level fault injection and error detection framework, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN)

, IEEE, pp.472-481, 2008.

J. Carreira, H. Madeira, and J. G. Silva, Xception: Software fault injection and monitoring in processor functional units, Dependable Computing and Fault Tolerant Systems, vol.10, pp.245-266, 1998.

A. Barenghi, G. M. Bertoni, L. Breveglieri, and G. Pelosi, A fault induction technique based on voltage underfeeding with application to attacks against aes and rsa, Journal of Systems and Software, vol.86, issue.7, pp.1864-1878, 2013.

J. Quisquater, Eddy current for magnetic analysis with active sensor, Proceedings of Esmart, pp.185-194, 2002.

S. Skorobogatov, Optical fault masking attacks, Fault Diagnosis and Tolerance in Cryptography (FDTC), 2010 Workshop on, pp.23-29, 2010.

J. Balasch, B. Gierlichs, and I. Verbauwhede, An in-depth and black-box characterization of the effects of clock glitches on 8bit mcus, Fault Diagnosis and Tolerance in Cryptography (FDTC), pp.105-114, 2011.

R. Piscitelli, S. Bhasin, and F. Regazzoni, Fault attacks, injection techniques and tools for simulation, Hardware Security and Trust, pp.27-47, 2017.

T. Given-wilson, A. Heuser, N. Jafri, J. Lanet, and A. Legay, An automated and scalable formal process for detecting fault injection vulnerabilities in binaries, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01629135

T. C. May and M. H. Woods, A new physical mechanism for soft errors in dynamic memories, Reliability Physics Symposium, 1978. 16th Annual, pp.33-40, 1978.

H. Bar-el, H. Choukri, D. Naccache, M. Tunstall, and C. Whelan, The sorcerer's apprentice guide to fault attacks, IACR Cryptology ePrint Archive, p.100, 2004.

A. Dehbaoui, J. Dutertre, B. Robisson, P. Orsatelli, P. Maurine et al., Injection of transient faults using electromagnetic pulses-practical results on a cryptographic system, IACR Cryptology EPrint Archive, vol.2012, p.123, 2012.

N. Moro, A. Dehbaoui, K. Heydemann, B. Robisson, and E. Encrenaz, Electromagnetic fault injection: towards a fault model on a 32-bit microcontroller, Fault Diagnosis and Tolerance in Cryptography (FDTC), 2013 Workshop on, pp.77-88, 2013.
URL : https://hal.archives-ouvertes.fr/emse-00871218

M. Seaborn and T. Dullien, Exploiting the dram rowhammer bug to gain kernel privileges, 2015.

K. S. Yim, The rowhammer attack injection methodology, Reliable Distributed Systems (SRDS), 2016 IEEE 35th Symposium on, pp.1-10, 2016.

R. Qiao and M. Seaborn, A new approach for rowhammer attacks, Hardware Oriented Security and Trust (HOST), pp.161-166, 2016.

R. Ecoffet, In-flight anomalies on electronic devices, Radiation Effects on Embedded Systems, pp.31-68, 2007.

M. Christofi, B. Chetali, and L. Goubin, Formal verification of an implementation of CRT-RSA vigilant's algorithm, PROOFS Workshop: Pre-proceedings, p.28, 2013.

C. Roscian, J. Dutertre, and A. Tria, Frontside laser fault injection on cryptosystems-application to the aes'last round, Hardware-Oriented Security and Trust (HOST), 2013 IEEE International Symposium on, pp.119-124, 2013.
URL : https://hal.archives-ouvertes.fr/emse-01109128

G. Wang and S. Wang, Differential fault analysis on present key schedule, Computational Intelligence and Security (CIS), 2010 International Conference on, pp.362-366, 2010.

I. Verbauwhede, D. Karaklajic, and J. Schmidt, The fault attack jungle-a classification model to guide you, Fault Diagnosis and Tolerance in Cryptography (FDTC), pp.3-8, 2011.

L. Dureuil, M. Potet, P. De-choudens, C. Dumas, and J. Clédì, From code review to fault injection attacks: Filling the gap using fault model inference, International Conference on Smart Card Research and Advanced Applications, pp.107-124, 2015.

L. Entrena, C. López-ongil, M. García-valderas, M. Portelagarcía, and M. Nicolaidis, Hardware fault injection, Soft Errors in Modern Electronic Systems, pp.141-166, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00564561

L. Riviere, Z. Najm, P. Rauzy, J. Danger, J. Bringer et al., High precision fault injections on the instruction cache of ARMv7-M architectures, Hardware Oriented Security and Trust (HOST), pp.62-67, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01208378

J. Kinder, S. Katzenbeisser, C. Schallhart, and H. Veith, Proactive detection of computer worms using model checking, IEEE Transactions on Dependable and Secure Computing, vol.7, issue.4, pp.424-438, 2010.

E. A. Emerson, The beginning of model checking: A personal perspective, 25 Years of Model Checking, pp.27-45, 2008.

S. Yamane, R. Konoshita, and T. Kato, Model checking of embedded assembly program based on simulation, IEICE TRANSACTIONS on Information and Systems, vol.100, issue.8, pp.1819-1826, 2017.

C. Baier, J. Katoen, and K. G. Larsen, Principles of model checking, 2008.

A. Legay, B. Delahaye, and S. Bensalem, Statistical model checking: An overview, International Conference on Runtime Verification, pp.122-135, 2010.
URL : https://hal.archives-ouvertes.fr/inria-00591593

K. B. Sebanjila, R. Lashermes, J. Lanet, and A. Legay, Lets shock our iots heart: Armv7-m under (fault) attacks, 2018.

M. Portela-garcia, C. Lopez-ongil, M. Garcia-valderas, and L. Entrena, A rapid fault injection approach for measuring seu sensitivity in complex processors, On-Line Testing Symposium, pp.101-106, 2007.

M. Kwiatkowska, G. Norman, and D. Parker, Prism 4.0: Verification of probabilistic real-time systems, pp.585-591, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00648035

R. Alur and T. A. Henzinger, Formal methods in system design, vol.15, pp.7-48, 1999.

A. Legay and L. Traonouez, Plasma lab statistical model checker: Architecture, usage and extension, 43rd International Conference on Current Trends in Theory and Practice of Computer Science, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01613581

M. Tunstall, D. Mukhopadhyay, and S. Ali, Differential fault analysis of the advanced encryption standard using a single fault, WISTP, vol.6633, pp.224-233, 2011.
URL : https://hal.archives-ouvertes.fr/hal-01573310

A. Cortex, Cortex-m3 technical reference manual, Rev. r1p1, 2006.

N. Moro, K. Heydemann, E. Encrenaz, and B. Robisson, Formal verification of a software countermeasure against instruction skip attacks, Journal of Cryptographic Engineering, vol.4, issue.3, pp.145-156, 2014.
URL : https://hal.archives-ouvertes.fr/emse-00869509

Y. Kim, R. Daly, J. Kim, C. Fallin, J. H. Lee et al., Flipping bits in memory without accessing them: An experimental study of dram disturbance errors, ACM SIGARCH Computer Architecture News, pp.361-372, 2014.

N. Standard, Announcing the advanced encryption standard (aes), Federal Information Processing Standards Publication, vol.197, pp.1-51, 2001.

N. Moro, Sécurisation de programmes assembleur face aux attaques visant les processeurs embarqués, 2014.