J. Balasch, B. Gierlichs, and I. Verbauwhede, An In-depth and Black-box Characterization of the Effects of Clock Glitches on 8-bit MCUs, 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2011.
DOI : 10.1109/FDTC.2011.9

H. Bar-el, H. Choukri, D. Naccache, M. Tunstall, and C. Whelan, The Sorcerer's Apprentice Guide to Fault Attacks, Proceedings of the IEEE, 2006.
DOI : 10.1109/JPROC.2005.862424

A. Barenghi, G. M. Bertoni, L. Breveglieri, M. Pelliccioli, and G. Pelosi, Injection Technologies for Fault Attacks on Microprocessors, Fault Analysis in Cryptography, Information Security and Cryptography, pp.275-293, 2012.
DOI : 10.1007/978-3-642-29656-7_16

A. Barenghi, L. Breveglieri, I. Koren, and D. Naccache, Fault Injection Attacks on Cryptographic Devices: Theory, Practice, and Countermeasures, Proceedings of the IEEE, vol.100, issue.11, pp.3056-3076, 2012.
DOI : 10.1109/JPROC.2012.2188769

URL : https://hal.archives-ouvertes.fr/hal-01110932

A. Barenghi, L. Breveglieri, I. Koren, G. Pelosi, and F. Regazzoni, Countermeasures against fault attacks on software implemented AES, Proceedings of the 5th Workshop on Embedded Systems Security, WESS '10, 2010.
DOI : 10.1145/1873548.1873555

D. Boneh, . Richarda, R. Demillo, and . Lipton, On the Importance of Checking Cryptographic Protocols for Faults, Advances in Cryptology -EUROCRYPT '97, pp.37-51, 1997.
DOI : 10.1007/3-540-69053-0_4

B. Chetali and Q. Nguyen, Industrial Use of Formal Methods for a High-Level Security Evaluation, FM 2008: Formal Methods, pp.198-213, 2008.
DOI : 10.1007/978-3-540-68237-0_15

M. Christofi, B. Chetali, L. Goubin, and D. Vigilant, Formal verification of a CRT-RSA implementation against fault attacks, Journal of Cryptographic Engineering, vol.2009, issue.3, 2013.
DOI : 10.1007/s13389-013-0049-3

A. Dehbaoui, J. Dutertre, B. Robisson, and A. Tria, Electromagnetic Transient Faults Injection on a Hardware and a Software Implementations of AES, 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2012.
DOI : 10.1109/FDTC.2012.15

URL : https://hal.archives-ouvertes.fr/emse-00742639

A. Fox and M. O. Myreen, A Trustworthy Monadic Formalization of the ARMv7 Instruction Set Architecture, Interactive Theorem Proving, pp.243-258, 2010.
DOI : 10.1007/978-3-642-14052-5_18

M. R. Guthaus, J. S. Ringenberg, D. Ernst, T. M. Austin, T. Mudge et al., MiBench: A free, commercially representative embedded benchmark suite, Proceedings of the Fourth Annual IEEE International Workshop on Workload Characterization. WWC-4 (Cat. No.01EX538), 2001.
DOI : 10.1109/WWC.2001.990739

D. Karaklaji´ckaraklaji´c, J. Schmidt, and I. Verbauwhede, Hardware Designer's Guide to Fault Attacks, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2013.

M. Medwed and J. Schmidt, A Generic Fault Countermeasure Providing Data and Program Flow Integrity, 2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography, 2008.
DOI : 10.1109/FDTC.2008.11

N. Moro, A. Dehbaoui, K. Heydemann, B. Robisson, and E. Encrenaz, Electromagnetic Fault Injection: Towards a Fault Model on a 32-bit Microcontroller, 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2013.
DOI : 10.1109/FDTC.2013.9

URL : https://hal.archives-ouvertes.fr/emse-00871218

M. Huu-nguyen, B. Robisson, M. Agoyan, and N. Drach, Low-cost recovery for the code integrity protection in secure embedded processors, 2011 IEEE International Symposium on Hardware-Oriented Security and Trust. IEEE, 2011.

P. Rauzy and S. Guilley, A formal proof of countermeasures against fault injection attacks on CRT-RSA, Journal of Cryptographic Engineering, vol.21, issue.2, 2013.
DOI : 10.1007/s13389-013-0065-3

URL : https://hal.archives-ouvertes.fr/hal-00863914

J. Schmidt and C. Herbst, A Practical Fault Attack on Square and Multiply, 2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography, 2008.
DOI : 10.1109/FDTC.2008.10

S. Skorobogatov, Local heating attacks on Flash memory devices, 2009 IEEE International Workshop on Hardware-Oriented Security and Trust, pp.1-6, 2009.
DOI : 10.1109/HST.2009.5225028

E. Trichina and R. Korkikyan, Multi Fault Laser Attacks on Protected CRT-RSA, 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2010.
DOI : 10.1109/FDTC.2010.14

J. Yiu, The Definitive Guide To The ARM Cortex-M3, 2009.

L. Zussa, J. Dutertre, B. Jessyclédì-ere, A. Robisson, and . Tria, Investigation of timing constraints violation as a fault injection means, DCIS, 2012.
URL : https://hal.archives-ouvertes.fr/emse-00742652