WYSINWYX, Verified software ,
DOI : 10.1145/1749608.1749612
The Sorcerer's Apprentice Guide to Fault Attacks, Proceedings of the IEEE ,
DOI : 10.1109/JPROC.2005.862424
Fault Injection Attacks on Cryptographic Devices: Theory, Practice, and Countermeasures, Proceedings of the IEEE, vol.100, issue.11 ,
DOI : 10.1109/JPROC.2012.2188769
URL : https://hal.archives-ouvertes.fr/hal-01110932
Countermeasures against fault attacks on software implemented AES, Proceedings of the 5th Workshop on Embedded Systems Security, WESS '10 ,
DOI : 10.1145/1873548.1873555
On the Importance of Checking Cryptographic Protocols for Faults, EUROCRYPT'97 ,
DOI : 10.1007/3-540-69053-0_4
MiBench: A free, commercially representative embedded benchmark suite, Proceedings of the Fourth Annual IEEE International Workshop on Workload Characterization. WWC-4 (Cat. No.01EX538), 2001. ,
DOI : 10.1109/WWC.2001.990739
Software Countermeasures for Control Flow Integrity of Smart Card C Codes, ESORICS 2014 ,
DOI : 10.1007/978-3-319-11212-1_12
URL : https://hal.archives-ouvertes.fr/hal-01059201
Electromagnetic Fault Injection: Towards a Fault Model on a 32-bit Microcontroller, 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2013. ,
DOI : 10.1109/FDTC.2013.9
URL : https://hal.archives-ouvertes.fr/emse-00871218
Formal verification of a software countermeasure against instruction skip attacks, Journal of Cryptographic Engineering, vol.100, issue.11 ,
DOI : 10.1007/s13389-014-0077-7
URL : https://hal.archives-ouvertes.fr/emse-00869509
The Fault Attack Jungle - A Classification Model to Guide You, 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2011. ,
DOI : 10.1109/FDTC.2011.13