Any sufficiently advanced technology is indistinguishable from magic, Profiles of the Future, 1962. ,
Évaluation de la Sécurité des Technologies de l'Information, pp.96-116 ,
8 Billion Smart Cards Shipped in 2014 Driven by Growth in the Banking and SIM Card Markets. https://www.abiresearch.com/ press/88-billion-smart-cards-shipped-in-2014-driven-by-g/. En ligne, 2015. ,
Low cost attacks on tamper resistant devices Bruno Crispo, Mark Lomas et Michael Roe. T. 1361, English. In : Security Protocols. Sous la dir. de Bruce Christianson, pp.125-136, 1998. ,
DOI : 10.1007/bfb0028165
URL : http://seclab.anseo.dankook.ac.kr/papers/tamper.ps
Outils d'aide à la recherche de vulnérabilités dans l'implantation d'applications embarquées sur carte à puce, Thèse de doct, pp.40-44, 2009. ,
Fault-tolerant systems, IEEE Transactions on Computers, vol.12, pp.1304-1312, 1976. ,
Assembly-Level Pre-injection Analysis for Improving Fault Injection Efficiency, European Dependable Computing Conference, pp.246-262, 2005. ,
DOI : 10.1007/11408901_19
Computer-Aided Security Proofs for the Working Cryptographer, English. In : Advances in Cryptology ? CRYPTO 2011. Sous la dir. de Phillip Rogaway. T. 6841. Lecture Notes in Computer Science ,
DOI : 10.1007/978-3-642-22792-9_5
URL : https://hal.archives-ouvertes.fr/hal-01112075
Synthesis of Fault Attacks on Cryptographic Implementations, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14 ,
DOI : 10.1090/S0025-5718-1985-0777282-X
URL : https://hal.archives-ouvertes.fr/hal-01094034
Correlation Power Analysis with a Leakage Model, Cryptographic Hardware and Embedded Systems-CHES 2004, pp.16-29, 2004. ,
DOI : 10.1007/978-3-540-28632-5_2
Compilation of a Countermeasure Against Instruction-Skip Fault Attacks, Proceedings of the Third Workshop on Cryptography and Security in Computing Systems, CS2 '16, pp.1-6 ,
DOI : 10.1109/FDTC.2011.13
URL : https://hal.archives-ouvertes.fr/cea-01296572
On the Importance of Checking Cryptographic Protocols for Faults, Advances in Cryptology?EUROCRYPT'97, pp.37-51, 1997. ,
DOI : 10.1007/3-540-69053-0_4
Asymptotic expansions of the binomial coefficients, Journal of Applied Mathematics and Computing, vol.236, issue.1-2, pp.135-145, 2014. ,
DOI : 10.1006/jmaa.1999.6420
Integrated Circuit Failure Analysis : A guide to preparation techniques, 1998. ,
QEMU, a Fast and Portable Dynamic Translator, USENIX Annual Technical Conference, FREENIX Track, pp.41-46, 2005. ,
Fault-list collapsing for fault-injection experiments, Annual Reliability and Maintainability Symposium. 1998 Proceedings. International Symposium on Product Quality and Integrity, 1998. ,
DOI : 10.1109/RAMS.1998.653808
High Level Model of Control Flow Attacks for Smart Card Functional Security, 2012 Seventh International Conference on Availability, Reliability and Security, pp.224-229, 2012. ,
DOI : 10.1109/ARES.2012.79
Idea: Embedded Fault Injection Simulator on Smartcard, pp.222-229 ,
DOI : 10.1007/978-3-319-04897-0_15
URL : https://hal.archives-ouvertes.fr/hal-01099996
Combined Software and Hardware Attacks on the Java Card Control Flow, Smart Card Research and Advanced Applications, pp.283-296, 2011. ,
DOI : 10.1007/978-3-642-27257-8_18
URL : https://hal.archives-ouvertes.fr/hal-00684616
Testing Feasibility of Back-Side Laser Fault Injection on a Microcontroller, Proceedings of the WESS'15: Workshop on Embedded Systems Security, WESS'15, pp.5-20 ,
DOI : 10.1002/pip.4670030303
A new CRT- RSA algorithm secure against bellcore attacks, CCS '03, 2003. ,
WYSINWYX, ACM Transactions on Programming Languages and Systems, vol.32, issue.6, pp.1-23 ,
DOI : 10.1145/1749608.1749612
A Universal Technique for Fast and Flexible Instruction-Set Architecture Simulation, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol.23, issue.12, pp.1625-1639, 2004. ,
DOI : 10.1109/TCAD.2004.836734
Attacks on Java Card 3.0 Combining Fault and Logical Attacks, Anglais. In : Smart Card Research and Advanced Application. 9th IFIP WG 8.8/11.2 International Conference ,
DOI : 10.1007/978-3-642-12510-2_11
URL : https://hal.archives-ouvertes.fr/hal-00692165
A compact high voltage nanosecond pulse generator, Proc. ESA AME, pp.1-12, 2008. ,
COM : An 8080 Simulator for the MC68000 ,
Common Criteria for Information Technology Security Evaluation, part 2 : Security functional components, 2012. ,
Common Criteria for Information Technology Security Evaluation, part 3 : Security Assurance Components, 2012. ,
KLEE : Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs, pp.209-224, 2008. ,
Formal verification of a CRT-RSA implementation against fault attacks, Journal of Cryptographic Engineering, vol.2009, issue.3 ,
DOI : 10.1023/A:1011254632723
Preuves de sécurité outillées d'implémentation cryptographiques, Thèse de doct, pp.2013-2036 ,
Xception: a technique for the experimental evaluation of dependability in modern computers, Software Engineering, pp.125-136, 1998. ,
DOI : 10.1109/32.666826
Pointguard TM : protecting pointers from buffer overflow vulnerabilities, Proceedings of the 12th conference on USENIX Security Symposium. T. 12, pp.91-104, 2003. ,
StackGuard : Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks, Usenix Security. T. 98, pp.63-78, 1998. ,
Compiling Java just in time, IEEE Micro, vol.17, issue.3, pp.36-43, 1997. ,
DOI : 10.1109/40.591653
Template Attacks, Cryptographic Hardware and Embedded Systems-CHES 2002, pp.13-28, 2003. ,
DOI : 10.1007/3-540-36400-5_3
An efficient implementation of SELF a dynamically-typed object-oriented language based on prototypes, pp.49-70, 1989. ,
New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.644-654, 1976. ,
DOI : 10.1109/TIT.1976.1055638
From Code Review to Fault Injection Attacks : Filling the Gap, 14th Smart Card Research and Advanced Application Conference (CARDIS'15, pp.2015-67 ,
Aude Crohen et Philippe de Choudens FISSC : a Fault Injection and Simulation Secure Collection, Computer Safety, Reliability and Security ? 35th International Conference SAFECOMP 2016. Lectures Notes in Computer Science, pp.2016-98 ,
DOI : 10.1007/978-3-319-45477-1_1
Évaluation par simulation de la sécurité des circuits face aux attaques par faute, Thèse de doct ,
Using faults for buffer overflow effects, Proceedings of the 27th Annual ACM Symposium on Applied Computing. ACM. 2012, pp.1638-1639 ,
ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs, Cryptographers' Track at the RSA Conference, pp.219-235, 2016. ,
DOI : 10.1007/978-3-319-29485-8_13
Efficient Design and Evaluation of Countermeasures against Fault Attacks Using Formal Verification, 14th Smart Card Research and Advanced Application Conference, CARDIS 2015, pp.2015-2057 ,
DOI : 10.1007/978-3-319-31271-2_11
Combining software-implemented and simulationbased fault injection into a single fault injection method " . In : Fault- Tolerant Computing, 1995. FTCS-25, Digest of Papers., Twenty-Fifth International Symposium on. Juin, pp.196-206, 1995. ,
The Mobile Economy 2014 ,
Relyzer : exploiting application-level fault equivalence to analyze application resiliency to transient faults, ACM SIGPLAN Notices. T. 47. 4. ACM. 2012, pp.123-134 ,
QEMU-Based Fault Injection for a System-Level Analysis of Software Countermeasures Against Fault Attacks, 2015 Euromicro Conference on Digital System Design, pp.530-533 ,
DOI : 10.1109/DSD.2015.79
Évaluation de l'injection de code malicieux dans une Java Card, Symposium sur la Sécurité des Technologies de l'Information et de la Communication, p.22, 2009. ,
Fault injection into VHDL models : the MEFISTO tool, Digest of Papers., Twenty-Fourth International Symposium on. IEEE, pp.66-75, 1994. ,
DOI : 10.1007/978-3-642-79789-7_19
Fault Analysis in Cryptography, pp.36-161, 2012. ,
DOI : 10.1007/978-3-642-29656-7
Concurrent error detection schemes for fault-based side-channel cryptanalysis of symmetric block ciphers, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol.21, issue.12, pp.1509-1517, 2002. ,
DOI : 10.1109/TCAD.2002.804378
Side channel attacks on cryptographic devices as a classification problem, Rapp. tech. COSIC technical report, 2009. ,
Analyses sécuritaires de code de carte à puce sous attaques physiques simulées, Thèse de doct. Université d'Orléans, pp.2012-2052 ,
Symbolic execution and program testing, Communications of the ACM, vol.19, issue.7, pp.385-394, 1976. ,
DOI : 10.1145/360248.360252
Introduction to Differential Power Analysis and Related Attacks. Rapp. tech. En ligne ; dernière consultation le 23, 1998. ,
Differential Power Analysis, Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology. CRYPTO '99, pp.388-397, 1999. ,
Design principles for tamperresistant smartcard processors, Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology. WOST'99. Chicago, Illinois : USENIX Association, 1999. ,
FER- RARI : A tool for the validation of system dependability properties, Digest of Papers., Twenty- Second International Symposium on. IEEE, pp.336-344, 1992. ,
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems, Advances in Cryptology?CRYPTO'96, pp.104-113, 1996. ,
Experimental Security Analysis of a Modern Automobile, 2010 IEEE Symposium on Security and Privacy, pp.447-462, 2010. ,
DOI : 10.1109/SP.2010.34
Fault attacks for CRT based RSA : New attacks, new results, and new countermeasures " . In : Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, pp.215-228, 2007. ,
Design and implementation of generics for the .Net common language runtime, In : ACM SigPlan Notices. T, vol.36 ,
LLVM: A compilation framework for lifelong program analysis & transformation, International Symposium on Code Generation and Optimization, 2004. CGO 2004., pp.75-86, 2004. ,
DOI : 10.1109/CGO.2004.1281665
Java Card Virtual Machine Compromising from a Bytecode Verified Applet, 14th Smart Card Research and Advanced Application Conference (CARDIS'15, pp.2015-2037 ,
DOI : 10.1007/978-3-319-31271-2_5
Hints on test data selection : Help for the practicing programmer, IEEE computer, vol.11, issue.4, pp.34-41, 1978. ,
Statically Detecting Likely Buffer Overflow Vulnerabilities, USENIX Security Symposium. T. 32. Washington DC, 2001. ,
Symbolic Fault-Injection " . In : International Verification Workshop (VERIFY). T. 259, pp.85-103, 2007. ,
Smart " banking cards catching on everywhere but U.S. https://www.washingtonpost.com/apps/g/page/business/smartbanking -cards -catching -on -everywhere -but -us, 2014. ,
Misuse of Frame Creation to Exploit Stack Underflow Attacks on Java Card, 14th Smart Card Research and Advanced Application Conference (CARDIS'15, pp.2015-2037 ,
DOI : 10.1007/978-3-319-31271-2_6
SmartCM a smart card fault injection simulator, IEEE International Workshop on Information Forensics and Security. IEEE, pp.40-44, 2011. ,
Mimic : A Fast System/370 Simulator ,
DOI : 10.1145/29650.29651
Power Analysis Attacks of Modular Exponentiation in Smartcards, Cryptographic Hardware and Embedded Systems, pp.144-157, 1999. ,
DOI : 10.1007/3-540-48059-5_14
The Definition of Standard ML (Revised), pp.262631814-135, 1997. ,
Improving smart card security using self-timed circuits, Proceedings Eighth International Symposium on Asynchronous Circuits and Systems, pp.211-248, 2002. ,
DOI : 10.1109/ASYNC.2002.1000311
URL : http://www.cl.cam.ac.uk/users/swm11/research/papers/async2002.pdf
Balanced self-checking asynchronous logic for smart card applications, Microprocessors and Microsystems, vol.27, issue.9, pp.421-430, 2003. ,
DOI : 10.1016/S0141-9331(03)00092-9
Electromagnetic Fault Injection: Towards a Fault Model on a 32-bit Microcontroller, 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.77-88 ,
DOI : 10.1109/FDTC.2013.9
URL : https://hal.archives-ouvertes.fr/emse-00871218
Sécurisation de programmes assembleur face aux attaques visant les processeurs embarqués, Thèse de doct, pp.2014-2061 ,
Malicious Code on Java Card Smartcards: Attacks and Countermeasures, Smart Card Research and Advanced Applications, pp.1-16, 2008. ,
DOI : 10.1109/SECPRI.2003.1199334
URL : http://repository.ubn.ru.nl/bitstream/2066/71934/1/71934.pdf
A comparative cost/security analysis of fault attack countermeasures " . In : Fault Diagnosis and Tolerance in Cryptography, pp.159-172, 2006. ,
Evidence of a Larger EM-Induced Fault Model, Lecture Notes in Computer Science, p.79, 2015. ,
DOI : 10.1007/978-3-319-16763-3_15
URL : https://hal.archives-ouvertes.fr/emse-01099037
SymPLFIED : Symbolic program-level fault injection and error detection framework, Dependable Systems and Networks With FTCS and DCC IEEE International Conference on. IEEE, pp.472-481, 2008. ,
DOI : 10.1109/tc.2012.219
URL : https://www.ideals.illinois.edu/bitstream/2142/74604/2/B59-CRHC_08_02.pdf
The SEMA referential framework : Avoiding ambiguities in the terms " security " and " safety, International Journal of Critical Infrastructure Protection, vol.32, pp.55-66, 2010. ,
Trace Execution Automata in Dynamic Binary Translation, International Symposium on Computer Architecture, pp.99-116, 2010. ,
DOI : 10.1145/1254810.1254823
URL : https://hal.archives-ouvertes.fr/inria-00492957
Maxime Puys et Louis Dureuil Lazart : A Symbolic Approach for Evaluation the Robustness of Secured Codes against Control Flow Injections, 2014 IEEE Seventh International Conference on. IEEE. 2014, pp.213-222 ,
Eddy current for magnetic analysis with active sensor, Proceedings of Esmart. T, p.20, 2002. ,
An efficient retargetable framework for instruction-set simulation, Proceedings of the 1st IEEE/ACM/IFIP international conference on Hardware/software codesign & system synthesis , CODES+ISSS '03, pp.13-18, 2003. ,
DOI : 10.1145/944645.944649
A Formal Proof of Countermeasures Against Fault Injection Attacks on CRT-RSA, Journal of Cryptographic Engineering, vol.43, issue.51, pp.41-44, 2014. ,
Countermeasures against High-Order Fault-Injection Attacks on CRT-RSA, 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography ,
DOI : 10.1109/FDTC.2014.17
URL : https://hal.archives-ouvertes.fr/hal-01071425
ArchC: A SystemC-Based Architecture Description Language, 16th Symposium on Computer Architecture and High Performance Computing, pp.66-73, 2004. ,
DOI : 10.1109/SBAC-PAD.2004.8
Hervé Chabanne et Maxime Puys Combining High-Level and Low- Level Approaches to Evaluate Software Implementations Robustness Against Multiple Fault Injection Attacks, International Symposium on Foundations and Practice of Security, pp.92-111, 2014. ,
High precision fault injections on the instruction cache of ARMv7-M architectures, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp.5-7, 2015. ,
DOI : 10.1109/HST.2015.7140238
Securing software implementations against fault injection attacks on embedded systems, p.73 ,
High Level Fault Injection for Attack Simulation in Smart Cards, 13th Asian Test Symposium, pp.118-121, 2004. ,
DOI : 10.1109/ATS.2004.48
Optical Fault Induction Attacks, Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems. CHES '02, pp.2-12, 2003. ,
GOOFI-2: A tool for experimental dependability assessment, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN), pp.557-562, 2010. ,
DOI : 10.1109/DSN.2010.5544265
Computer Structures : principles and examples, p.35, 1982. ,
FAIL*: An Open and Versatile Fault-Injection Framework for the Assessment of Software-Implemented Hardware Fault Tolerance, 2015 11th European Dependable Computing Conference (EDCC), pp.2015-2054 ,
DOI : 10.1109/EDCC.2015.28
Avoiding Pitfalls in Fault-Injection Based Comparison of Program Susceptibility to Soft Errors, 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, pp.319-330, 2015. ,
DOI : 10.1109/DSN.2015.44
FIAT-fault injection based automated testing environment, Fault-Tolerant Computing, 1988. ,
Optical and EM Fault-Attacks on CRT-based RSA : Concrete Results, 15th Austrian Workshop on Microelectronics, pp.61-67, 2007. ,
Evaluation of Countermeasures Against Fault Attacks on Smart Cards, International Journal of Security and Its Applications, vol.52, pp.49-61, 2011. ,
Semi-invasive attacks : a new approach to hardware security analysis. Rapp. tech. This technical report is based on a dissertation submitted by the author for the degree of Doctor of Philosophy to the, 2004. ,
Physical Attacks and Tamper Resistance, Proc. of 2nd ARO Special Workshop on Hardware Assurance, 2011. ,
DOI : 10.1007/978-1-4419-8080-9_7
GDSL: A Generic Decoder Specification Language for Interpreting Machine Language, Electronic Notes in Theoretical Computer Science, vol.289, pp.53-64, 2012. ,
DOI : 10.1016/j.entcs.2012.11.006
URL : https://doi.org/10.1016/j.entcs.2012.11.006
A method to determine equivalent fault classes for permanent and transient faults " . In : Reliability and Maintainability Symposium, Proceedings., Annual, pp.418-424, 1995. ,
Acoustic cryptanalysis In : presentation available from http, p.167, 2004. ,
VERIFY : evaluation of reliability using VHDL-models with embedded fault descriptions In : Fault-Tolerant Computing, 1997. FTCS-27, Digest of Papers., Twenty- Seventh Annual International Symposium on. Juin, pp.32-36, 1997. ,
A Software High Performance APL Interpreter, Proceedings of the International Conference on APL : Part 1. APL '79, pp.74-81, 1979. ,
Multi Fault Laser Attacks on Protected CRT-RSA, 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.75-86, 2010. ,
DOI : 10.1109/FDTC.2010.14
Testing software for characteristics other than correctness : Safety, failure tolerance and security, Inproceedings of the 13th international conference on testing computer software, p.18, 1996. ,
Early partial evaluation in a JIT-compiled, retargetable instruction set simulator generated from a high-level architecture description, Proceedings of the 50th Annual Design Automation Conference on, DAC '13, pp.21-155, 2013. ,
DOI : 10.1145/2463209.2488760
On-the-fly generation of K-path tests for C functions, Proceedings. 19th International Conference on Automated Software Engineering, 2004., pp.290-293, 2004. ,
DOI : 10.1109/ASE.2004.1342749
Fault Attacks on Dual-Rail Encoded Systems, 21st Annual Computer Security Applications Conference (ACSAC'05), pp.10-37, 2005. ,
DOI : 10.1109/CSAC.2005.25
URL : http://nma.berkeley.edu/ark:/28722/bk0005s589z
Protecting the Control Flow of Embedded Processors against Fault Attacks, International Conference on Smart Card Research and Advanced Applications, pp.161-176, 2015. ,
DOI : 10.1007/978-3-319-31271-2_10