An automated formal process for detecting fault injection vulnerabilities in binaries and case study on PRESENT, 2017 IEEE Trustcom/BigDataSE/ICESS, pp.293-300, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01629098
Lazart: A symbolic approach for evaluation the robustness of secured codes against control flow injections, 2014 IEEE Seventh International Conference on Software Testing, Verification and Validation, pp.213-222, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01229274
SymPLFIED: Symbolic program-level fault injection and error detection framework, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN) ,
, IEEE, pp.472-481, 2008.
Xception: Software fault injection and monitoring in processor functional units, Dependable Computing and Fault Tolerant Systems, vol.10, pp.245-266, 1998. ,
A fault induction technique based on voltage underfeeding with application to attacks against aes and rsa, Journal of Systems and Software, vol.86, issue.7, pp.1864-1878, 2013. ,
Eddy current for magnetic analysis with active sensor, Proceedings of Esmart, pp.185-194, 2002. ,
Optical fault masking attacks, Fault Diagnosis and Tolerance in Cryptography (FDTC), 2010 Workshop on, pp.23-29, 2010. ,
An in-depth and black-box characterization of the effects of clock glitches on 8bit mcus, Fault Diagnosis and Tolerance in Cryptography (FDTC), pp.105-114, 2011. ,
Fault attacks, injection techniques and tools for simulation, Hardware Security and Trust, pp.27-47, 2017. ,
An automated and scalable formal process for detecting fault injection vulnerabilities in binaries, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01629135
A new physical mechanism for soft errors in dynamic memories, Reliability Physics Symposium, 1978. 16th Annual, pp.33-40, 1978. ,
The sorcerer's apprentice guide to fault attacks, IACR Cryptology ePrint Archive, p.100, 2004. ,
Injection of transient faults using electromagnetic pulses-practical results on a cryptographic system, IACR Cryptology EPrint Archive, vol.2012, p.123, 2012. ,
Electromagnetic fault injection: towards a fault model on a 32-bit microcontroller, Fault Diagnosis and Tolerance in Cryptography (FDTC), 2013 Workshop on, pp.77-88, 2013. ,
URL : https://hal.archives-ouvertes.fr/emse-00871218
Exploiting the dram rowhammer bug to gain kernel privileges, 2015. ,
The rowhammer attack injection methodology, Reliable Distributed Systems (SRDS), 2016 IEEE 35th Symposium on, pp.1-10, 2016. ,
A new approach for rowhammer attacks, Hardware Oriented Security and Trust (HOST), pp.161-166, 2016. ,
In-flight anomalies on electronic devices, Radiation Effects on Embedded Systems, pp.31-68, 2007. ,
Formal verification of an implementation of CRT-RSA vigilant's algorithm, PROOFS Workshop: Pre-proceedings, p.28, 2013. ,
Frontside laser fault injection on cryptosystems-application to the aes'last round, Hardware-Oriented Security and Trust (HOST), 2013 IEEE International Symposium on, pp.119-124, 2013. ,
URL : https://hal.archives-ouvertes.fr/emse-01109128
Differential fault analysis on present key schedule, Computational Intelligence and Security (CIS), 2010 International Conference on, pp.362-366, 2010. ,
The fault attack jungle-a classification model to guide you, Fault Diagnosis and Tolerance in Cryptography (FDTC), pp.3-8, 2011. ,
From code review to fault injection attacks: Filling the gap using fault model inference, International Conference on Smart Card Research and Advanced Applications, pp.107-124, 2015. ,
Hardware fault injection, Soft Errors in Modern Electronic Systems, pp.141-166, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00564561
High precision fault injections on the instruction cache of ARMv7-M architectures, Hardware Oriented Security and Trust (HOST), pp.62-67, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01208378
Proactive detection of computer worms using model checking, IEEE Transactions on Dependable and Secure Computing, vol.7, issue.4, pp.424-438, 2010. ,
The beginning of model checking: A personal perspective, 25 Years of Model Checking, pp.27-45, 2008. ,
Model checking of embedded assembly program based on simulation, IEICE TRANSACTIONS on Information and Systems, vol.100, issue.8, pp.1819-1826, 2017. ,
Principles of model checking, 2008. ,
Statistical model checking: An overview, International Conference on Runtime Verification, pp.122-135, 2010. ,
URL : https://hal.archives-ouvertes.fr/inria-00591593
Lets shock our iots heart: Armv7-m under (fault) attacks, 2018. ,
A rapid fault injection approach for measuring seu sensitivity in complex processors, On-Line Testing Symposium, pp.101-106, 2007. ,
Prism 4.0: Verification of probabilistic real-time systems, pp.585-591, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00648035
Formal methods in system design, vol.15, pp.7-48, 1999. ,
Plasma lab statistical model checker: Architecture, usage and extension, 43rd International Conference on Current Trends in Theory and Practice of Computer Science, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01613581
Differential fault analysis of the advanced encryption standard using a single fault, WISTP, vol.6633, pp.224-233, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-01573310
Cortex-m3 technical reference manual, Rev. r1p1, 2006. ,
Formal verification of a software countermeasure against instruction skip attacks, Journal of Cryptographic Engineering, vol.4, issue.3, pp.145-156, 2014. ,
URL : https://hal.archives-ouvertes.fr/emse-00869509
Flipping bits in memory without accessing them: An experimental study of dram disturbance errors, ACM SIGARCH Computer Architecture News, pp.361-372, 2014. ,
Announcing the advanced encryption standard (aes), Federal Information Processing Standards Publication, vol.197, pp.1-51, 2001. ,
Sécurisation de programmes assembleur face aux attaques visant les processeurs embarqués, 2014. ,