Malicious wave: A survey on actively tampering using electromagnetic glitch, International Symposium on Electromagnetic Compatibility, pp.318-321, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01061254
The sorcerer's apprentice guide to fault attacks, Proceedings of the IEEE, vol.94, pp.370-382, 2006. ,
Electromagnetic Glitch on the AES Round Counter, 4th International conference on Constructive Side-Channel Analysis and Secure Design, vol.7864, pp.17-31, 2013. ,
URL : https://hal.archives-ouvertes.fr/emse-00837514
, Countermeasures against fault attacks on software implemented AES: effectiveness and cost, in: 5th Workshop on Embedded Systems Security, pp.1-10, 2010.
A countermeasure against one physical cryptanalysis may benefit another attack, 4th International Conference on Information Security and Cryptology, vol.2288, pp.414-427, 2001. ,
FISSC: a Fault Injection and Simulation Secure Collection, International Conference on Computer Safety, reliability and Security, vol.9922, pp.3-11, 2016. ,
Lazart: A Symbolic Approach for Evaluation the Robustness of Secured Codes against Control Flow Injections, 7th International Conference on Software Testing, Verification and Validation, pp.213-222, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01229274
Compilation of a Countermeasure Against Instruction-Skip Fault Attacks, 3rd Workshop on Cryptography and Security in Computing Systems, pp.1-6, 2016. ,
URL : https://hal.archives-ouvertes.fr/emse-01271252
Link-time smart card code hardening, Int. J. Inf. Sec, vol.15, issue.2, pp.111-130, 2016. ,
Advanced Compiler Design and Implementation, 1997. ,
, Modern Compiler Implementation in C, 2004.
High level model of control flow attacks for smart card functional security, 7th International Conference on Availability, Reliability and Security, pp.224-229, 2012. ,
, Combining High-Level and Low-Level Approaches to Evaluate Software Implementations Robustness Against Multiple Fault Injection Attacks
URL : https://hal.archives-ouvertes.fr/hal-01229261
, IEEE, vol.8930, pp.92-111, 2015.
Compilerassisted loop hardening against fault attacks, ACM Trans. Archit. Code Optim, vol.14, issue.4, p.25, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01657542
On the importance of eliminating errors in cryptographic computations, Journal of Cryptology, vol.14, issue.2, pp.101-119, 2001. ,
, Fault Diagnosis and Tolerance in Cryptography Workshop, pp.25-35, 2016.
Experimental evaluation of two software countermeasures against fault attacks, International Symposium on Hardware-Oriented Security and Trust (HOST), pp.112-117, 2014. ,
URL : https://hal.archives-ouvertes.fr/emse-01032449
, Software Countermeasures for Control Flow Integrity of Smart Card C Codes, vol.8713, pp.200-218, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01059201
Controlflow integrity principles, implementations, and applications, ACM Transactions on Information and System Security, vol.13, issue.1, 2009. ,
DOI : 10.1145/1609956.1609960
, Design, Automation & Test in Europe Conference & Exhibition, pp.1172-1177, 2016.
Protecting the control flow of embedded processors against fault attacks, 14th International Conference Smart Card Research and Advanced Applications, vol.9514, pp.161-176, 2015. ,
, Fine-grained controlflow integrity through binary hardening, in: 12th Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pp.144-164, 2015.
, 13th Annual IEEE/ACM International Symposium on Code Generation and Optimization, pp.79-90, 2015.
, Electromagnetic Fault Injection: Towards a Fault Model on a 32-bit Microcontroller, pp.77-88, 2013.
DOI : 10.1109/fdtc.2013.9
URL : https://hal.archives-ouvertes.fr/emse-00871218
SymPLFIED: Symbolic Program-Level Fault Injection and Error Detection Framework, IEEE Transactions on Computers, vol.62, issue.11, pp.2292-2307, 2013. ,
DOI : 10.1109/tc.2012.219
URL : https://www.ideals.illinois.edu/bitstream/2142/74604/2/B59-CRHC_08_02.pdf
The fault attack jungle -A classification model to guide you, in: Fault Diagnosis and Tolerance in Cryptography, IEEE Computer Society, pp.3-8, 2011. ,
High-Level Simulation for Multiple Fault Injection Evaluation, 3rd International Workshop on Quantitative Aspects in Security Assurance, vol.8872, pp.293-308, 2015. ,
DOI : 10.1007/978-3-319-17016-9_19
URL : https://hal.archives-ouvertes.fr/hal-01229279
From code review to fault injection attacks: Filling the gap using fault model inference, 14th International Conference Smart Card Research and Advanced Applications, vol.9514, pp.107-124, 2015. ,
Securing software implementations against fault injection attacks on embedded systems, 2015. ,
An in-depth and black-box characterization of the effects of clock glitches on 8-bit MCUs, 8th Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.105-114, 2011. ,
, Combined software and hardware attacks on the java card control flow, pp.283-296, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00684616
Detecting Software Vulnerabilities -Static Taint Analysis, Bsc thesis, 2009. ,
Chucky: exposing missing checks in source code for vulnerability discovery, Conference on Computer and Communications Security, pp.499-510, 2013. ,
Countermeasures against high-order fault-injection attacks on CRT-RSA, Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.68-82, 2014. ,
DOI : 10.1109/fdtc.2014.17
URL : https://hal.archives-ouvertes.fr/hal-01071425
A novel simulation approach for fault injection resistance evaluation on smart cards, 6th international Workshop on Security Testing, pp.1-8, 2015. ,
FER-RARI: a flexible software-based fault and error injection system, IEEE Transactions on Computers, vol.44, issue.2, pp.248-260, 1995. ,
DOI : 10.1109/12.364536
Fault injection attacks on cryptographic devices: Theory, practice, and countermeasures, Proceedings of the IEEE, vol.100, issue.11, pp.3056-3076, 2012. ,
DOI : 10.1109/jproc.2012.2188769
URL : https://hal.archives-ouvertes.fr/hal-01110932
Robisson, Formal verification of a software countermeasure against instruction skip attacks, Journal of Cryptographic Engineering, vol.4, issue.3, pp.1-12, 2014. ,
The geometry of innocent flesh on the bone, 14th Conference on Computer and communications security, pp.552-561, 2007. ,
Mitigating code-reuse attacks with control-flow locking, 27th Annual Computer Security Applications Conference, pp.353-362, 2011. ,
DOI : 10.1145/2076732.2076783
Sok: Eternal war in memory, Symposium on Security and Privacy, pp.48-62, 2013. ,
DOI : 10.1109/sp.2013.13
Runtime execution monitoring (REM) to detect and prevent malicious code execution, International Conference on Computer Design: VLSI in Computers and Processors, pp.452-457, 2004. ,
DOI : 10.1109/iccd.2004.1347961
CFIMon: Detecting violation of control flow integrity using performance counters, IEEE/IFIP International Conference on Dependable Systems and Networks, pp.1-12, 2012. ,
HCODE: hardware-enhanced real-time CFI, 4th Program Protection and Reverse Engineering Workshop, vol.6, p.11, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01575947
Control-flow checking by software signatures, IEEE Transactions on Reliability, vol.51, issue.1, pp.111-122, 2002. ,
DOI : 10.1109/24.994926
Oblivious hashing: A stealthy software integrity verification primitive, 5th International Workshop on Information Hiding, pp.400-414, 2003. ,
DOI : 10.1007/3-540-36415-3_26
Improved software-based processor control-flow errors detection technique, Annual Reliability and Maintainability Symposium, pp.583-589, 2005. ,
Detecting Laser Fault Injection for Smart Cards Using Security Automata, International Symposium on Security in Computing and Communications, vol.377, pp.18-29, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00966373
, 18th International Symposium on Defect and Fault Tolerance in VLSI Systems, pp.589-596, 2003.
, u)sim java card platform protection profile basic and scws configurations, SFR and AFOM and Trusted Labs, 2010.
Automatic Integration of Counter-Measures Against Fault Injection Attacks, Proceedings of E-Smart, pp.1-13, 2003. ,
A byte-oriented AES-256 implementation, 2007. ,
, VIS: A system for verification and synthesis, vol.1102, pp.428-432, 1996.
MiBench: A free, commercially representative embedded benchmark suite, 4th Annual Workshop on Workload Characterization, pp.3-14, 2001. ,
Keil uVision for ARM processors, 2012. ,
Passive and active combined attacks: Combining fault attacks and side channel analysis, Proceedings of the Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.75-79, 2007. ,