B. Douglas and . Armstrong, A deductive method for simulating faults in logic circuits, IEEE Transactions on Computers, vol.100, issue.5, pp.464-471, 1972.

W. Mark, C. L. Bailey, J. Coleman, and . Davidson, Defense against the dark arts, ACM SIGCSE Bulletin, vol.40, issue.1, pp.315-319, 2008.

A. Balakrishnan and C. Schulze, Code obfuscation literature survey, 2005.

H. Bar-el, H. Choukri, D. Naccache, M. Tunstall, and C. Whelan, The sorcerer's apprentice guide to fault attacks, Proceedings of the IEEE, vol.94, issue.2, pp.370-382, 2006.

G. Barbu, G. Duc, and P. Hoogvorst, Java Card operand stack: fault attacks, combined attacks and countermeasures, International Conference on Smart Card Research and Advanced Applications, pp.297-313, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00692171

G. Barbu, H. Thiebeauld, and V. Guerin, Attacks on Java Card 3.0 combining fault and logical attacks, International Conference on Smart Card Research and Advanced Applications, pp.148-163, 2010.
URL : https://hal.archives-ouvertes.fr/hal-00692165

A. Barenghi, G. Bertoni, E. Parrinello, and G. Pelosi, Low voltage fault attacks on the RSA cryptosystem, Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pp.23-31, 2009.

E. G. Barrantes, H. David, S. Ackley, D. Forrest, and . Stefanovi?, Randomized instruction set emulation, ACM Transactions on Information and System Security (TISSEC), vol.8, issue.1, pp.3-40, 2005.

J. Blömer, M. Otto, and J. Seifert, A new CRT-RSA algorithm secure against bellcore attacks, Proceedings of the 10th ACM conference on Computer and communications security, pp.311-320, 2003.

D. Boneh, A. Richard, R. J. Demillo, and . Lipton, On the importance of checking cryptographic protocols for faults, International conference on the theory and applications of cryptographic techniques, pp.37-51, 1997.

J. , M. Borello, and L. Mé, Code obfuscation techniques for metamorphic viruses, Journal in Computer Virology, vol.4, issue.3, pp.211-220, 2008.
URL : https://hal.archives-ouvertes.fr/hal-00353061

G. Bouffard, J. Iguchi-cartigny, and J. Lanet, Combined software and hardware attacks on the Java Card control flow, International Conference on Smart Card Research and Advanced Applications, pp.283-296, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00684616

G. Bouffard and J. Lanet, The ultimate control flow transfer in a Java based smart card, Computers & Security, vol.50, pp.33-46, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01211370

C. Sally, C. N. Brailsford, B. M. Potts, and . Smith, Constraint satisfaction problems: Algorithms and applications, European Journal of Operational Research, vol.119, issue.3, pp.557-581, 1999.

K. Sebanjila, R. Bukasa, J. Lashermes, A. Lanet, and . Leqay, Let's shock our IoT's heart: ARMv7-M under (fault) attacks, Proceedings of the 13th International Conference on Availability, Reliability and Security, p.33, 2018.

J. Cappaert, Code obfuscation techniques for software protection, 2012.

F. Charreteur and A. Gotlieb, Constraint-based test input generation for Java bytecode, IEEE 21st International Symposium on Software Reliability Engineering (ISSRE), pp.131-140, 2010.
URL : https://hal.archives-ouvertes.fr/hal-00699236

C. Colberg, C. Thomborson, and D. Low, Manufacturing Cheap Resilient and Stealthy Opaque Constructs. roc, ymp. Principles of Programming Languages (POPL'98), 1998.

C. Collberg, C. Thomborson, and D. Low, A taxonomy of obfuscating transformations, 1997.

S. Drape, Intellectual property protection using obfuscation, Proceedings of SAS 2009, vol.4779, pp.133-144, 2009.

N. Eyrolles, Obfuscation with Mixed Boolean-Arithmetic Expressions: reconstruction, analysis and simplification tools, 2017.
URL : https://hal.archives-ouvertes.fr/tel-01623849

P. Faruki, A. Bharmal, V. Laxmi, V. Ganmoor, M. Singh-gaur et al., Android security: a survey of issues, malware penetration, and defenses, IEEE communications surveys & tutorials, vol.17, issue.2, pp.998-1022, 2015.

E. Gandotra, D. Bansal, and S. Sofat, Malware analysis and classification: A survey, Journal of Information Security, vol.5, issue.02, p.56, 2014.

S. Guilley, L. Sauvage, J. Danger, N. Selmane, and R. Pacalet, Silicon-level solutions to counteract passive and active attacks, FDTC, pp.3-17, 2008.
URL : https://hal.archives-ouvertes.fr/hal-00311431

H. Donald and . Habing, The use of lasers to simulate radiation-induced transients in semiconductor devices and circuits, IEEE Transactions on Nuclear Science, vol.39, pp.1647-1653, 1992.

S. Hamadouche and J. Lanet, Virus in a smart card: Myth or reality, Journal of Information Security and Applications, vol.18, issue.2-3, pp.130-137, 2013.

S. Hamadouche, M. Mezghiche, A. Gotlieb, and J. Lanet, Vers une approche de construction de virus pour cartesà puce basée sur la résolution de contraintes. Actes de la 13èmeédition dAFADL, Atelier Francophone sur les Approches Formelles dans lAssistance au Développement de Logiciels, 2014.

H. Fred, R. J. Hardie, and . Suhocki, Design and use of fault simulation for saturn computer design, IEEE Transactions on Electronic Computers, issue.4, pp.412-429, 1967.

S. Hosseinzadeh, S. Rauti, S. Laurén, J. Mäkelä, J. Holvitie et al., Diversification and obfuscation techniques for software security: A systematic literature review, Information and Software Technology, 2018.

M. Hutter and J. Schmidt, The temperature side channel and heating fault attacks, International Conference on Smart Card Research and Advanced Applications, pp.219-235, 2013.

P. Junod, J. Rinaldini, J. Wehrli, and J. Michielin, Obfuscator-LLVMsoftware protection for the masses, IEEE/ACM 1st International Workshop on Software Protection (SPRO), pp.3-9, 2015.

D. Karaklaji?, J. Schmidt, and I. Verbauwhede, Hardware designer's guide to fault attacks, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol.21, pp.2295-2306, 2013.

. Gaurav-s-kc, D. Angelos, V. Keromytis, and . Prevelakis, Countering code-injection attacks with instruction-set randomization, Proceedings of the 10th ACM conference on Computer and communications security, pp.272-280, 2003.

S. Martin, K. Kelly, J. Mayes, and . Walker, Characterising a CPU fault attack model via run-time data analysis, IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp.79-84, 2017.

T. Korak and M. Hoefler, On the effects of clock and power supply tampering on two microcontroller platforms, Fault Diagnosis and Tolerance in Cryptography (FDTC), pp.8-17, 2014.

V. Kumar, Algorithms for constraint-satisfaction problems: A survey. AI magazine, vol.13, p.32, 1992.

J. Lancia, Java Card combined attacks with localization-agnostic fault injection, International Conference on Smart Card Research and Advanced Applications, pp.31-45, 2012.

D. Low, Java control flow obfuscation, 1998.

M. Madou, B. Anckaert, B. D. Bus, K. De-bosschere, J. Cappaert et al., On the effectiveness of source code transformations for binary obfuscation, Proceedings of the International Conference on Software Engineering Research and Practice (SERP06), pp.527-533, 2006.

R. Premachandran, S. G. Menon, and . Chappell, Deductive fault simulation with functional blocks, IEEE Transactions on Computers, issue.8, pp.689-695, 1978.

A. Mesbah, J. Lanet, and M. Mezghiche, Reverse engineering Java Card and vulnerability exploitation: a shortcut to ROM, International Journal of Information Security, pp.1-16, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01887577

A. Mesbah, M. Mezghiche, and J. Lanet, Persistent fault injection attack from white-box to black-box, 5th International Conference on Electrical Engineering Boumerdes (ICEE-B), pp.1-6, 2017.

I. Miguel and Q. Shen, Solution techniques for constraint satisfaction problems: Foundations, Artificial Intelligence Review, vol.15, issue.4, pp.243-267, 2001.

N. Moro, A. Dehbaoui, K. Heydemann, B. Robisson, and E. Encrenaz, Electromagnetic fault injection: towards a fault model on a 32-bit microcontroller, Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.77-88, 2013.
URL : https://hal.archives-ouvertes.fr/emse-00871218

S. Nashimoto, N. Homma, Y. Hayashi, J. Takahashi, H. Fuji et al., Buffer overflow attack with multiple fault injection and a proven countermeasure, Journal of Cryptographic Engineering, vol.7, issue.1, pp.35-46, 2017.

. J. Oracle, T. M. Card, and . Platform, Version 3.0.5 Classic Edition : Virtual Machine Specification, Oracle America, 2015.

R. Piscitelli, S. Bhasin, and F. Regazzoni, Fault attacks, injection techniques and tools for simulation, Hardware Security and Trust, pp.27-47

. Springer, , 2017.

M. Babak-bashari-rad, S. Masrom, and . Ibrahim, Camouflage in malware: from encryption to metamorphism, International Journal of Computer Science and Network Security, vol.12, issue.8, pp.74-83, 2012.

L. Riviere, Z. Najm, P. Rauzy, J. Danger, J. Bringer et al., High precision fault injections on the instruction cache of ARMv7-M architectures, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01208378

J. Schmidt and M. Hutter, Optical and EM fault-attacks on CRT-based RSA: Concrete results. na, 2007.

J. Singh and J. Singh, Challenge of Malware Analysis: Malware obfuscation Techniques, International Journal of Information Security Science, vol.7, issue.3, pp.100-110, 2018.

S. Singla, E. Gandotra, D. Bansal, and S. Sofat, Detecting and classifying morphed malwares: A survey, International Journal of Computer Applications, vol.122, issue.10, 2015.

P. Sergei, R. Skorobogatov, and . Anderson, Optical fault induction attacks, ternational workshop on cryptographic hardware and embedded systems, pp.2-12

. Springer, , 2002.

N. Timmers, A. Spruyt, and M. Witteman, Controlling PC on ARM using fault injection, Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pp.25-35, 2016.

E. Tsang, Foundations of constraint satisfaction, 1995.

G. Ernst, T. Ulrich, . Baker, and . Williams, Fault-test analysis techniques based on logic simulation, Proceedings of the 9th Design Automation Workshop, pp.111-115, 1972.

E. Vetillard and A. Ferrari, Combined attacks and countermeasures, International Conference on Smart Card Research and Advanced Applications, pp.133-147
URL : https://hal.archives-ouvertes.fr/hal-01056108

. Springer, , 2010.

D. Wagner, Cryptanalysis of a provably secure CRT-RSA algorithm, Proceedings of the 11th ACM conference on Computer and communications security, pp.92-97, 2004.

S. Winter, On the Utility of Higher Order Fault Models for Fault Injections, 2015.

H. Xu, Y. Zhou, Y. Kang, and M. R. Lyu, On Secure and Usable Program Obfuscation: A Survey, 2017.

I. You and K. Yim, Malware obfuscation techniques: A brief survey, International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA), pp.297-300, 2010.

B. Yuce, P. Schaumont, and M. Witteman, Fault Attacks on Secure Embedded Software: Threats, Design, and Evaluation, Journal of Hardware and Systems Security, pp.1-20, 2018.