». and A. C. Clarke, Any sufficiently advanced technology is indistinguishable from magic, Profiles of the Future, 1962.

C. Centre and D. , Évaluation de la Sécurité des Technologies de l'Information, pp.96-116

[. Xxiii-bibliographie and . Research, 8 Billion Smart Cards Shipped in 2014 Driven by Growth in the Banking and SIM Card Markets. https://www.abiresearch.com/ press/88-billion-smart-cards-shipped-in-2014-driven-by-g/. En ligne, 2015.

[. Anderson and M. G. Kuhn, Low cost attacks on tamper resistant devices Bruno Crispo, Mark Lomas et Michael Roe. T. 1361, English. In : Security Protocols. Sous la dir. de Bruce Christianson, pp.125-136, 1998.
DOI : 10.1007/bfb0028165

URL : http://seclab.anseo.dankook.ac.kr/papers/tamper.ps

P. Andouard, Outils d'aide à la recherche de vulnérabilités dans l'implantation d'applications embarquées sur carte à puce, Thèse de doct, pp.40-44, 2009.

A. Avi76-]-algirdas and . Avi?ienis, Fault-tolerant systems, IEEE Transactions on Computers, vol.12, pp.1304-1312, 1976.

J. Barbosa, P. Vinter, J. Folkesson, and . Karlsson, Assembly-Level Pre-injection Analysis for Improving Fault Injection Efficiency, European Dependable Computing Conference, pp.246-262, 2005.
DOI : 10.1007/11408901_19

[. Barthe, B. Grégoire, S. Heraud, and . Santiago-zanella-béguelin, Computer-Aided Security Proofs for the Working Cryptographer, English. In : Advances in Cryptology ? CRYPTO 2011. Sous la dir. de Phillip Rogaway. T. 6841. Lecture Notes in Computer Science
DOI : 10.1007/978-3-642-22792-9_5

URL : https://hal.archives-ouvertes.fr/hal-01112075

[. Barthe, F. Dupressoir, P. Fouque, B. Grégoire, and J. Zapalowicz, Synthesis of Fault Attacks on Cryptographic Implementations, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14
DOI : 10.1090/S0025-5718-1985-0777282-X

URL : https://hal.archives-ouvertes.fr/hal-01094034

[. Brier, C. Clavier, and F. Olivier, Correlation Power Analysis with a Leakage Model, Cryptographic Hardware and Embedded Systems-CHES 2004, pp.16-29, 2004.
DOI : 10.1007/978-3-540-28632-5_2

[. Barry, D. Couroussé, and B. Robisson, Compilation of a Countermeasure Against Instruction-Skip Fault Attacks, Proceedings of the Third Workshop on Cryptography and Security in Computing Systems, CS2 '16, pp.1-6
DOI : 10.1109/FDTC.2011.13

URL : https://hal.archives-ouvertes.fr/cea-01296572

[. Boneh, R. A. Demillo, and R. J. Lipton, On the Importance of Checking Cryptographic Protocols for Faults, Advances in Cryptology?EUROCRYPT'97, pp.37-51, 1997.
DOI : 10.1007/3-540-69053-0_4

[. Buri? and N. Elezovi?, Asymptotic expansions of the binomial coefficients, Journal of Applied Mathematics and Computing, vol.236, issue.1-2, pp.135-145, 2014.
DOI : 10.1006/jmaa.1999.6420

[. Beck, Integrated Circuit Failure Analysis : A guide to preparation techniques, 1998.

F. Bellard, QEMU, a Fast and Portable Dynamic Translator, USENIX Annual Technical Conference, FREENIX Track, pp.41-46, 2005.

[. Benso, M. Rebaudengo, L. Impagliazzo, and P. Marmo, Fault-list collapsing for fault-injection experiments, Annual Reliability and Maintainability Symposium. 1998 Proceedings. International Symposium on Product Quality and Integrity, 1998.
DOI : 10.1109/RAMS.1998.653808

[. Berthomé, K. Heydemann, X. Kauffmann-tourkestansky, and J. Lalande, High Level Model of Control Flow Attacks for Smart Card Functional Security, 2012 Seventh International Conference on Availability, Reliability and Security, pp.224-229, 2012.
DOI : 10.1109/ARES.2012.79

J. Berthier, H. Bringer, T. Chabanne, L. Le, V. Rivière et al., Idea: Embedded Fault Injection Simulator on Smartcard, pp.222-229
DOI : 10.1007/978-3-319-04897-0_15

URL : https://hal.archives-ouvertes.fr/hal-01099996

G. Bouffard, J. Iguchi-cartigny, and J. Lanet, Combined Software and Hardware Attacks on the Java Card Control Flow, Smart Card Research and Advanced Applications, pp.283-296, 2011.
DOI : 10.1007/978-3-642-27257-8_18

URL : https://hal.archives-ouvertes.fr/hal-00684616

J. Breier and D. Jap, Testing Feasibility of Back-Side Laser Fault Injection on a Microcontroller, Proceedings of the WESS'15: Workshop on Embedded Systems Security, WESS'15, pp.5-20
DOI : 10.1002/pip.4670030303

[. Blömer, M. Otto, and J. Seifert, A new CRT- RSA algorithm secure against bellcore attacks, CCS '03, 2003.

T. Balakrishnan and . Reps, WYSINWYX, ACM Transactions on Programming Languages and Systems, vol.32, issue.6, pp.1-23
DOI : 10.1145/1749608.1749612

[. Braun, A. Nohl, A. Hoffmann, O. Schliebusch, R. Leupers et al., A Universal Technique for Fast and Flexible Instruction-Set Architecture Simulation, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol.23, issue.12, pp.1625-1639, 2004.
DOI : 10.1109/TCAD.2004.836734

G. Barbu, H. Thiebeauld, and V. Guerin, Attacks on Java Card 3.0 Combining Fault and Logical Attacks, Anglais. In : Smart Card Research and Advanced Application. 9th IFIP WG 8.8/11.2 International Conference
DOI : 10.1007/978-3-642-12510-2_11

URL : https://hal.archives-ouvertes.fr/hal-00692165

[. Campbell, J. Harper, V. Natham, F. Xiao, and R. Sundararajan, A compact high voltage nanosecond pulse generator, Proc. ESA AME, pp.1-12, 2008.

J. Cathey, COM : An 8080 Simulator for the MC68000

. Ccr12a, C. The, and . Management-committee, Common Criteria for Information Technology Security Evaluation, part 2 : Security functional components, 2012.

. Ccr12b, C. The, and . Management-committee, Common Criteria for Information Technology Security Evaluation, part 3 : Security Assurance Components, 2012.

[. Cadar, D. Dunbar, and D. R. Engler, KLEE : Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs, pp.209-224, 2008.

[. Christofi, B. Chetali, L. Goubin, and D. Vigilant, Formal verification of a CRT-RSA implementation against fault attacks, Journal of Cryptographic Engineering, vol.2009, issue.3
DOI : 10.1023/A:1011254632723

[. Christofi, Preuves de sécurité outillées d'implémentation cryptographiques, Thèse de doct, pp.2013-2036

[. Carreira and H. Silva, Xception: a technique for the experimental evaluation of dependability in modern computers, Software Engineering, pp.125-136, 1998.
DOI : 10.1109/32.666826

[. Cowan, S. Beattie, J. Johansen, and P. Wagle, Pointguard TM : protecting pointers from buffer overflow vulnerabilities, Proceedings of the 12th conference on USENIX Security Symposium. T. 12, pp.91-104, 2003.

[. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke et al., StackGuard : Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks, Usenix Security. T. 98, pp.63-78, 1998.

[. Cramer, R. Friedman, T. Miller, D. Seberger, R. Wilson et al., Compiling Java just in time, IEEE Micro, vol.17, issue.3, pp.36-43, 1997.
DOI : 10.1109/40.591653

[. Chari, J. R. Rao, and P. Rohatgi, Template Attacks, Cryptographic Hardware and Embedded Systems-CHES 2002, pp.13-28, 2003.
DOI : 10.1007/3-540-36400-5_3

[. Chambers, D. Ungar, and E. Lee, An efficient implementation of SELF a dynamically-typed object-oriented language based on prototypes, pp.49-70, 1989.

[. Diffie and M. E. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.644-654, 1976.
DOI : 10.1109/TIT.1976.1055638

[. Dureuil, M. Potet, P. De-choudens, C. Dumas, and J. Clédière, From Code Review to Fault Injection Attacks : Filling the Gap, 14th Smart Card Research and Advanced Application Conference (CARDIS'15, pp.2015-67

[. Dureuil, G. Petiot, M. Potet, and T. Le, Aude Crohen et Philippe de Choudens FISSC : a Fault Injection and Simulation Secure Collection, Computer Safety, Reliability and Security ? 35th International Conference SAFECOMP 2016. Lectures Notes in Computer Science, pp.2016-98
DOI : 10.1007/978-3-319-45477-1_1

O. Faurax, Évaluation par simulation de la sécurité des circuits face aux attaques par faute, Thèse de doct

D. Pierre-alain-fouque, F. Leresteux, and . Valette, Using faults for buffer overflow effects, Proceedings of the 27th Annual ACM Symposium on Applied Computing. ACM. 2012, pp.1638-1639

[. Genkin, L. Pachmanov, I. Pipman, and E. Tromer, ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs, Cryptographers' Track at the RSA Conference, pp.219-235, 2016.
DOI : 10.1007/978-3-319-29485-8_13

L. Goubet, K. Heydemann, E. Encrenaz, D. Keulenaer, and R. , Efficient Design and Evaluation of Countermeasures against Fault Attacks Using Formal Verification, 14th Smart Card Research and Advanced Application Conference, CARDIS 2015, pp.2015-2057
DOI : 10.1007/978-3-319-31271-2_11

V. [. Güthoff and . Sieh, Combining software-implemented and simulationbased fault injection into a single fault injection method " . In : Fault- Tolerant Computing, 1995. FTCS-25, Digest of Papers., Twenty-Fifth International Symposium on. Juin, pp.196-206, 1995.

[. Gsma, The Mobile Economy 2014

[. Hari, S. V. Adve, H. Naeimi, and P. Ramachandran, Relyzer : exploiting application-level fault equivalence to analyze application resiliency to transient faults, ACM SIGPLAN Notices. T. 47. 4. ACM. 2012, pp.123-134

A. Höller, A. Krieg, T. Rauter, J. Iber, and C. Kreiner, QEMU-Based Fault Injection for a System-Level Analysis of Software Countermeasures Against Fault Attacks, 2015 Euromicro Conference on Digital System Design, pp.530-533
DOI : 10.1109/DSD.2015.79

J. Iguchi-cartigny and J. Lanet, Évaluation de l'injection de code malicieux dans une Java Card, Symposium sur la Sécurité des Technologies de l'Information et de la Communication, p.22, 2009.

E. Jenn, J. Arlat, M. Rimen, J. Ohlsson, and J. Karlsson, Fault injection into VHDL models : the MEFISTO tool, Digest of Papers., Twenty-Fourth International Symposium on. IEEE, pp.66-75, 1994.
DOI : 10.1007/978-3-642-79789-7_19

M. Joye and M. Tunstall, Fault Analysis in Cryptography, pp.36-161, 2012.
DOI : 10.1007/978-3-642-29656-7

[. Karri, K. Wu, P. Mishra, and Y. Kim, Concurrent error detection schemes for fault-based side-channel cryptanalysis of symmetric block ciphers, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol.21, issue.12, pp.1509-1517, 2002.
DOI : 10.1109/TCAD.2002.804378

B. Peter-karsmakers, K. Gierlichs, K. Pelckmans, J. De-cock, B. Suykens et al., Side channel attacks on cryptographic devices as a classification problem, Rapp. tech. COSIC technical report, 2009.

. Kau12-]-xavier-kauffmann-tourkestansky, Analyses sécuritaires de code de carte à puce sous attaques physiques simulées, Thèse de doct. Université d'Orléans, pp.2012-2052

J. C. King, Symbolic execution and program testing, Communications of the ACM, vol.19, issue.7, pp.385-394, 1976.
DOI : 10.1145/360248.360252

C. Paul, J. Kocher, B. Jaffe, and . Jun, Introduction to Differential Power Analysis and Related Attacks. Rapp. tech. En ligne ; dernière consultation le 23, 1998.

C. Paul, J. Kocher, B. Jaffe, and . Jun, Differential Power Analysis, Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology. CRYPTO '99, pp.388-397, 1999.

[. Kömmerling and M. G. Kuhn, Design principles for tamperresistant smartcard processors, Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology. WOST'99. Chicago, Illinois : USENIX Association, 1999.

A. Ghani, . Kanawati, A. Nasser, J. A. Kanawati, and . Abraham, FER- RARI : A tool for the validation of system dependability properties, Digest of Papers., Twenty- Second International Symposium on. IEEE, pp.336-344, 1992.

C. Paul and . Kocher, Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems, Advances in Cryptology?CRYPTO'96, pp.104-113, 1996.

A. Koscher, F. Czeskis, S. Roesner, T. Patel, S. Kohno et al., Experimental Security Analysis of a Modern Automobile, 2010 IEEE Symposium on Security and Privacy, pp.447-462, 2010.
DOI : 10.1109/SP.2010.34

C. H. , K. , and J. Quisquater, Fault attacks for CRT based RSA : New attacks, new results, and new countermeasures " . In : Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, pp.215-228, 2007.

A. Kennedy and D. Syme, Design and implementation of generics for the .Net common language runtime, In : ACM SigPlan Notices. T, vol.36

C. Lattner and V. Adve, LLVM: A compilation framework for lifelong program analysis & transformation, International Symposium on Code Generation and Optimization, 2004. CGO 2004., pp.75-86, 2004.
DOI : 10.1109/CGO.2004.1281665

[. Lancia and G. Bouffard, Java Card Virtual Machine Compromising from a Bytecode Verified Applet, 14th Smart Card Research and Advanced Application Conference (CARDIS'15, pp.2015-2037
DOI : 10.1007/978-3-319-31271-2_5

J. Richard, . Lipton, A. Richard, F. Demillo, and . Sayward, Hints on test data selection : Help for the practicing programmer, IEEE computer, vol.11, issue.4, pp.34-41, 1978.

[. Larochelle and D. Evans, Statically Detecting Likely Buffer Overflow Vulnerabilities, USENIX Security Symposium. T. 32. Washington DC, 2001.

[. Larsson and R. Hähnle, Symbolic Fault-Injection " . In : International Verification Workshop (VERIFY). T. 259, pp.85-103, 2007.

T. Lin14-]-lindeman, Smart " banking cards catching on everywhere but U.S. https://www.washingtonpost.com/apps/g/page/business/smartbanking -cards -catching -on -everywhere -but -us, 2014.

[. Laugier and T. Razafindralambo, Misuse of Frame Creation to Exploit Stack Underflow Attacks on Java Card, 14th Smart Card Research and Advanced Application Conference (CARDIS'15, pp.2015-2037
DOI : 10.1007/978-3-319-31271-2_6

C. Jean-baptiste-machemie, J. Mazin, J. Lanet, and . Cartigny, SmartCM a smart card fault injection simulator, IEEE International Workshop on Information Forensics and Security. IEEE, pp.40-44, 2011.

[. May, Mimic : A Fast System/370 Simulator
DOI : 10.1145/29650.29651

T. S. Messerges, A. Ezzy, R. H. Dabbish, and . Sloan, Power Analysis Attacks of Modular Exponentiation in Smartcards, Cryptographic Hardware and Embedded Systems, pp.144-157, 1999.
DOI : 10.1007/3-540-48059-5_14

[. Milner, M. Tofte, R. Harper, and D. Macqueen, The Definition of Standard ML (Revised), pp.262631814-135, 1997.

[. Moore, R. Anderson, P. Cunningham, R. Mullins, and G. Taylor, Improving smart card security using self-timed circuits, Proceedings Eighth International Symposium on Asynchronous Circuits and Systems, pp.211-248, 2002.
DOI : 10.1109/ASYNC.2002.1000311

URL : http://www.cl.cam.ac.uk/users/swm11/research/papers/async2002.pdf

[. Moore, R. Anderson, R. Mullins, G. Taylor, and J. J. Fournier, Balanced self-checking asynchronous logic for smart card applications, Microprocessors and Microsystems, vol.27, issue.9, pp.421-430, 2003.
DOI : 10.1016/S0141-9331(03)00092-9

[. Moro, A. Dehbaoui, K. Heydemann, B. Robisson, and E. Encrenaz, Electromagnetic Fault Injection: Towards a Fault Model on a 32-bit Microcontroller, 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.77-88
DOI : 10.1109/FDTC.2013.9

URL : https://hal.archives-ouvertes.fr/emse-00871218

[. Moro, Sécurisation de programmes assembleur face aux attaques visant les processeurs embarqués, Thèse de doct, pp.2014-2061

[. Mostowski and E. Poll, Malicious Code on Java Card Smartcards: Attacks and Countermeasures, Smart Card Research and Advanced Applications, pp.1-16, 2008.
DOI : 10.1109/SECPRI.2003.1199334

URL : http://repository.ubn.ru.nl/bitstream/2066/71934/1/71934.pdf

G. Tal, F. Malkin, M. Standaert, and . Yung, A comparative cost/security analysis of fault attack countermeasures " . In : Fault Diagnosis and Tolerance in Cryptography, pp.159-172, 2006.

[. Ordas, L. Guillaume-sage, K. Tobich, J. Dutertre, and P. Maurine, Evidence of a Larger EM-Induced Fault Model, Lecture Notes in Computer Science, p.79, 2015.
DOI : 10.1007/978-3-319-16763-3_15

URL : https://hal.archives-ouvertes.fr/emse-01099037

[. Pattabiraman, N. Nakka, Z. Kalbarczyk, and R. Iyer, SymPLFIED : Symbolic program-level fault injection and error detection framework, Dependable Systems and Networks With FTCS and DCC IEEE International Conference on. IEEE, pp.472-481, 2008.
DOI : 10.1109/tc.2012.219

URL : https://www.ideals.illinois.edu/bitstream/2142/74604/2/B59-CRHC_08_02.pdf

[. and C. Chaudet, The SEMA referential framework : Avoiding ambiguities in the terms " security " and " safety, International Journal of Critical Infrastructure Protection, vol.32, pp.55-66, 2010.

J. Porto, G. Araujo, E. Borin, and Y. Wu, Trace Execution Automata in Dynamic Binary Translation, International Symposium on Computer Architecture, pp.99-116, 2010.
DOI : 10.1145/1254810.1254823

URL : https://hal.archives-ouvertes.fr/inria-00492957

M. Potet and L. Mounier, Maxime Puys et Louis Dureuil Lazart : A Symbolic Approach for Evaluation the Robustness of Secured Codes against Control Flow Injections, 2014 IEEE Seventh International Conference on. IEEE. 2014, pp.213-222

J. Quisquater and D. Samyde, Eddy current for magnetic analysis with active sensor, Proceedings of Esmart. T, p.20, 2002.

[. Reshadi, N. Bansal, P. Mishra, and N. Dutt, An efficient retargetable framework for instruction-set simulation, Proceedings of the 1st IEEE/ACM/IFIP international conference on Hardware/software codesign & system synthesis , CODES+ISSS '03, pp.13-18, 2003.
DOI : 10.1145/944645.944649

[. English, A Formal Proof of Countermeasures Against Fault Injection Attacks on CRT-RSA, Journal of Cryptographic Engineering, vol.43, issue.51, pp.41-44, 2014.

[. Rauzy and S. Guilley, Countermeasures against High-Order Fault-Injection Attacks on CRT-RSA, 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography
DOI : 10.1109/FDTC.2014.17

URL : https://hal.archives-ouvertes.fr/hal-01071425

S. Rigo, G. Araujo, M. Bartholomeu, and R. Azevedo, ArchC: A SystemC-Based Architecture Description Language, 16th Symposium on Computer Architecture and High Performance Computing, pp.66-73, 2004.
DOI : 10.1109/SBAC-PAD.2004.8

M. Rivière, T. Potet, J. Le, and . Bringer, Hervé Chabanne et Maxime Puys Combining High-Level and Low- Level Approaches to Evaluate Software Implementations Robustness Against Multiple Fault Injection Attacks, International Symposium on Foundations and Practice of Security, pp.92-111, 2014.

Z. Rivière, P. Najm, J. Rauzy, B. Danger, L. Julien et al., High precision fault injections on the instruction cache of ARMv7-M architectures, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp.5-7, 2015.
DOI : 10.1109/HST.2015.7140238

L. Rivière, Securing software implementations against fault injection attacks on embedded systems, p.73

K. Rothbart, U. Neffe, C. Steger, R. Weiss, E. Rieger et al., High Level Fault Injection for Attack Simulation in Smart Cards, 13th Asian Test Symposium, pp.118-121, 2004.
DOI : 10.1109/ATS.2004.48

P. Sergei, R. J. Skorobogatov, and . Anderson, Optical Fault Induction Attacks, Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems. CHES '02, pp.2-12, 2003.

[. Skarin, R. Barbosa, and L. Karlsson, GOOFI-2: A tool for experimental dependability assessment, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN), pp.557-562, 2010.
DOI : 10.1109/DSN.2010.5544265

P. Daniel, G. Siewiorek, C. Bell-et-allen, and . Newell, Computer Structures : principles and examples, p.35, 1982.

H. Schirmeier, M. Hoffmann, C. Dietrich, M. Lenz, D. Lohmann et al., FAIL*: An Open and Versatile Fault-Injection Framework for the Assessment of Software-Implemented Hardware Fault Tolerance, 2015 11th European Dependable Computing Conference (EDCC), pp.2015-2054
DOI : 10.1109/EDCC.2015.28

[. Schirmeier, B. Christoph, and O. Spinczyk, Avoiding Pitfalls in Fault-Injection Based Comparison of Program Susceptibility to Soft Errors, 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, pp.319-330, 2015.
DOI : 10.1109/DSN.2015.44

R. Barton, A. Dancey, T. Robinson, and . Lin, FIAT-fault injection based automated testing environment, Fault-Tolerant Computing, 1988.

[. Schmidt and M. Hutter, Optical and EM Fault-Attacks on CRT-based RSA : Concrete Results, 15th Austrian Workshop on Microelectronics, pp.61-67, 2007.

A. Séré, J. Iguchi-cartigny, and J. Lanet, Evaluation of Countermeasures Against Fault Attacks on Smart Cards, International Journal of Security and Its Applications, vol.52, pp.49-61, 2011.

S. P. Skorobogatov, Semi-invasive attacks : a new approach to hardware security analysis. Rapp. tech. This technical report is based on a dissertation submitted by the author for the degree of Doctor of Philosophy to the, 2004.

S. P. Skorobogatov, Physical Attacks and Tamper Resistance, Proc. of 2nd ARO Special Workshop on Hardware Assurance, 2011.
DOI : 10.1007/978-1-4419-8080-9_7

[. Sepp, J. Kranz, and A. Simon, GDSL: A Generic Decoder Specification Language for Interpreting Machine Language, Electronic Notes in Theoretical Computer Science, vol.289, pp.53-64, 2012.
DOI : 10.1016/j.entcs.2012.11.006

URL : https://doi.org/10.1016/j.entcs.2012.11.006

. Bozzolo, A method to determine equivalent fault classes for permanent and transient faults " . In : Reliability and Maintainability Symposium, Proceedings., Annual, pp.418-424, 1995.

A. Shamir and E. Tromer, Acoustic cryptanalysis In : presentation available from http, p.167, 2004.

[. Sieh, O. Tschache, and F. Balbach, VERIFY : evaluation of reliability using VHDL-models with embedded fault descriptions In : Fault-Tolerant Computing, 1997. FTCS-27, Digest of Papers., Twenty- Seventh Annual International Symposium on. Juin, pp.32-36, 1997.

J. Harry, Z. Saal, and . Weiss, A Software High Performance APL Interpreter, Proceedings of the International Conference on APL : Part 1. APL '79, pp.74-81, 1979.

[. Trichina and R. Korkikyan, Multi Fault Laser Attacks on Protected CRT-RSA, 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.75-86, 2010.
DOI : 10.1109/FDTC.2010.14

J. Voas, Testing software for characteristics other than correctness : Safety, failure tolerance and security, Inproceedings of the 13th international conference on testing computer software, p.18, 1996.

H. Wagstaff, M. Gould, B. Franke, and N. Topham, Early partial evaluation in a JIT-compiled, retargetable instruction set simulator generated from a high-level architecture description, Proceedings of the 50th Annual Design Automation Conference on, DAC '13, pp.21-155, 2013.
DOI : 10.1145/2463209.2488760

[. Williams, B. Marre, and P. Mouy, On-the-fly generation of K-path tests for C functions, Proceedings. 19th International Conference on Automated Software Engineering, 2004., pp.290-293, 2004.
DOI : 10.1109/ASE.2004.1342749

J. Waddle and D. Wagner, Fault Attacks on Dual-Rail Encoded Systems, 21st Annual Computer Security Applications Conference (ACSAC'05), pp.10-37, 2005.
DOI : 10.1109/CSAC.2005.25

URL : http://nma.berkeley.edu/ark:/28722/bk0005s589z

M. Werner, E. Wenger, and S. Mangard, Protecting the Control Flow of Embedded Processors against Fault Attacks, International Conference on Smart Card Research and Advanced Applications, pp.161-176, 2015.
DOI : 10.1007/978-3-319-31271-2_10