R. 1. Abadi, M. B. Erlingsson, and J. Ligatti, Control-flow integrity, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, p.340, 2005.
DOI : 10.1145/1102120.1102165

M. L. Akkar, L. Goubin, and O. Ly, Automatic integration of counter-measures against fault injection attacks. Pre-print found at http://www. labri. fr/Perso, 2003.

C. Aumuller, P. Bier, W. Fischer, P. Hofreiter, and J. P. Seifert, Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures, Lecture Notes in Computer Science, pp.260-275, 2003.
DOI : 10.1007/3-540-36400-5_20

H. Bar-el, H. Choukri, D. Naccache, M. Tunstall, C. Whelan et al., The Sorcerer's Apprentice Guide to Fault Attacks, Proceedings of the IEEE, pp.370-382, 2006.
DOI : 10.1109/JPROC.2005.862424

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.5258

G. Barbu, H. Thiebeauld, and V. Guerin, Attacks on Java Card 3.0 Combining Fault and Logical Attacks. Smart Card Research and Advanced Application, LNCS, vol.6035, pp.148-163, 2010.
URL : https://hal.archives-ouvertes.fr/hal-00692165

J. Blomer, M. Otto, and J. P. Seifert, A new CRT-RSA algorithm secure against Bellcore attacks, Proceedings of the 10th ACM conference on Computer and communications security, pp.311-320, 2003.

G. Bouffard, J. Cartigny, and J. Lanet, Combined Software and Hardware Attacks on the Java Card Control Flow, Cardis 2011
DOI : 10.1007/978-3-642-27257-8_18

URL : https://hal.archives-ouvertes.fr/hal-00684616

L. Hemme, A Differential Fault Attack Against Early Rounds of (Triple-)DES, Cryptographic Hardware and Embedded Systems-CHES 2004, pp.170-217, 2004.
DOI : 10.1007/978-3-540-28632-5_19

J. Iguchi-cartigny and J. Lanet, Developing a Trojan applets in a smart card, Journal in Computer Virology, vol.8, issue.2, pp.343-351, 2010.
DOI : 10.1007/s11416-009-0135-3

N. Oh, P. P. Shirvani, and E. J. Mccluskey, Control-flow checking by software signatures, IEEE Transactions on Reliability, vol.51, issue.1, pp.111-122, 2002.
DOI : 10.1109/24.994926

G. Piret and J. J. Quisquater, A Differential Fault Attack Technique against SPN Structures, with Application to the AES and Khazad, Cryptographic Hardware and Embedded Systems-CHES 2003, pp.77-88, 2003.
DOI : 10.1007/978-3-540-45238-6_7

G. A. Reis, J. Chang, N. Vachharajani, R. Rangan, and D. I. , SWIFT: Software Implemented Fault Tolerance, International Symposium on Code Generation and Optimization, pp.243-254, 2005.
DOI : 10.1109/CGO.2005.34

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.472.4177

K. Scott and J. Davidson, Safe virtual execution using software dynamic translation, 18th Annual Computer Security Applications Conference, 2002. Proceedings., p.209, 2002.
DOI : 10.1109/CSAC.2002.1176292

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.137.9915

A. A. Sere, J. Iguchi-cartigny, and J. Lanet, Automatic detection of fault attack and countermeasures, Proceedings of the 4th Workshop on Embedded Systems Security, WESS '09, pp.1-7, 2009.
DOI : 10.1145/1631716.1631723

A. A. Sere, J. Iguchi-cartigny, and J. Lanet, A path check detection mechanism for embedded systems, Proceedings of SecTech, vol.6485, pp.459-469, 2010.

S. P. Skorobogatov and R. J. Anderson, Optical fault induction attacks. Lecture notes in computer science, pp.2-12, 2003.
DOI : 10.1007/3-540-36400-5_2

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.9.5680

. Sunmicrosystems, Java Card 3.0.1 Specification, Sun Microsystems, 2009.

E. Vetillard and A. Ferrari, Combined Attacks and Countermeasures. Smart Card Research and Advanced Application, Cardis 2010, pp.133-147, 2010.
DOI : 10.1007/978-3-642-12510-2_10

URL : https://hal.archives-ouvertes.fr/hal-01056108

D. Wagner, 16 i c o n s t _ 4 ; 17 b a l o a d ; 18 i s t o r e _ 3 ; 19 a l o a d _ 1 ; 20 i n v o k e v i r t u a l 1 9 ; 23 i 2 b ; 24 i s t o r e 4 ; 26 i l o a d _ 3 ; 27 i c o n s t _ 1 ; 28 i f _ i c m p n e 9 ; 31 i l o a d 4 ; 33 i c o n s t _ 1 ; 34 i f _ i c m p e q 9 ; 37 s i p u s h 2 6 3 6 8 ; 40 i n v o k e s t a t i c 1 3 7 ; 52 i f _ i c m p g t 8 ; 55 i l o a d 5 s ; 74 i f g e 9, Proceedings of the 11th ACM conference on Computer and communications security, pp.92-97, 2004.