Control-flow integrity, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, p.340, 2005. ,
DOI : 10.1145/1102120.1102165
Automatic integration of counter-measures against fault injection attacks. Pre-print found at http://www. labri. fr/Perso, 2003. ,
Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures, Lecture Notes in Computer Science, pp.260-275, 2003. ,
DOI : 10.1007/3-540-36400-5_20
The Sorcerer's Apprentice Guide to Fault Attacks, Proceedings of the IEEE, pp.370-382, 2006. ,
DOI : 10.1109/JPROC.2005.862424
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.5258
Attacks on Java Card 3.0 Combining Fault and Logical Attacks. Smart Card Research and Advanced Application, LNCS, vol.6035, pp.148-163, 2010. ,
URL : https://hal.archives-ouvertes.fr/hal-00692165
A new CRT-RSA algorithm secure against Bellcore attacks, Proceedings of the 10th ACM conference on Computer and communications security, pp.311-320, 2003. ,
Combined Software and Hardware Attacks on the Java Card Control Flow, Cardis 2011 ,
DOI : 10.1007/978-3-642-27257-8_18
URL : https://hal.archives-ouvertes.fr/hal-00684616
A Differential Fault Attack Against Early Rounds of (Triple-)DES, Cryptographic Hardware and Embedded Systems-CHES 2004, pp.170-217, 2004. ,
DOI : 10.1007/978-3-540-28632-5_19
Developing a Trojan applets in a smart card, Journal in Computer Virology, vol.8, issue.2, pp.343-351, 2010. ,
DOI : 10.1007/s11416-009-0135-3
Control-flow checking by software signatures, IEEE Transactions on Reliability, vol.51, issue.1, pp.111-122, 2002. ,
DOI : 10.1109/24.994926
A Differential Fault Attack Technique against SPN Structures, with Application to the AES and Khazad, Cryptographic Hardware and Embedded Systems-CHES 2003, pp.77-88, 2003. ,
DOI : 10.1007/978-3-540-45238-6_7
SWIFT: Software Implemented Fault Tolerance, International Symposium on Code Generation and Optimization, pp.243-254, 2005. ,
DOI : 10.1109/CGO.2005.34
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.472.4177
Safe virtual execution using software dynamic translation, 18th Annual Computer Security Applications Conference, 2002. Proceedings., p.209, 2002. ,
DOI : 10.1109/CSAC.2002.1176292
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.137.9915
Automatic detection of fault attack and countermeasures, Proceedings of the 4th Workshop on Embedded Systems Security, WESS '09, pp.1-7, 2009. ,
DOI : 10.1145/1631716.1631723
A path check detection mechanism for embedded systems, Proceedings of SecTech, vol.6485, pp.459-469, 2010. ,
Optical fault induction attacks. Lecture notes in computer science, pp.2-12, 2003. ,
DOI : 10.1007/3-540-36400-5_2
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.9.5680
Java Card 3.0.1 Specification, Sun Microsystems, 2009. ,
Combined Attacks and Countermeasures. Smart Card Research and Advanced Application, Cardis 2010, pp.133-147, 2010. ,
DOI : 10.1007/978-3-642-12510-2_10
URL : https://hal.archives-ouvertes.fr/hal-01056108
16 i c o n s t _ 4 ; 17 b a l o a d ; 18 i s t o r e _ 3 ; 19 a l o a d _ 1 ; 20 i n v o k e v i r t u a l 1 9 ; 23 i 2 b ; 24 i s t o r e 4 ; 26 i l o a d _ 3 ; 27 i c o n s t _ 1 ; 28 i f _ i c m p n e 9 ; 31 i l o a d 4 ; 33 i c o n s t _ 1 ; 34 i f _ i c m p e q 9 ; 37 s i p u s h 2 6 3 6 8 ; 40 i n v o k e s t a t i c 1 3 7 ; 52 i f _ i c m p g t 8 ; 55 i l o a d 5 s ; 74 i f g e 9, Proceedings of the 11th ACM conference on Computer and communications security, pp.92-97, 2004. ,