D. Boneh, R. A. Demillo, and R. J. Lipton, On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract), LNCS, vol.1233, pp.37-51, 1997.

J. Balasch, B. Gierlichs, and I. Verbauwhede, An In-depth and Black-box Characterization of the Effects of Clock Glitches on 8-bit MCUs, 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.105-114, 2011.
DOI : 10.1109/FDTC.2011.9

A. Dehbaoui, J. Dutertre, B. Robisson, and A. Tria, Electromagnetic Transient Faults Injection on a Hardware and a Software Implementations of AES, 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.7-15, 2012.
DOI : 10.1109/FDTC.2012.15

URL : https://hal.archives-ouvertes.fr/emse-00742639

S. P. Skorobogatov and R. J. Anderson, Optical Fault Induction Attacks, CHES, volume 2523 of LNCS, pp.2-12, 2002.
DOI : 10.1007/3-540-36400-5_2

E. Biham and A. Shamir, Differential fault analysis of secret key cryptosystems, Lecture Notes in Computer Science, vol.1294, pp.513-525, 1997.
DOI : 10.1007/BFb0052259

J. Machemie, C. Mazin, J. Lanet, and J. Cartigny, SmartCM a smart card fault injection simulator, 2011 IEEE International Workshop on Information Forensics and Security, pp.1-6, 2011.
DOI : 10.1109/WIFS.2011.6123124

URL : https://hal.archives-ouvertes.fr/hal-00685220

P. Berthomé, K. Heydemann, X. Kauffmann-tourkestansky, and J. Lalande, High Level Model of Control Flow Attacks for Smart Card Functional Security, 2012 Seventh International Conference on Availability, Reliability and Security, pp.224-229, 2012.
DOI : 10.1109/ARES.2012.79

M. Christofi, B. Chetali, L. Goubin, and D. Vigilant, Formal verification of a CRT-RSA implementation against fault attacks, Journal of Cryptographic Engineering, vol.2009, issue.3, pp.157-167, 2013.
DOI : 10.1007/s13389-013-0049-3

H. Bar-el, H. Choukri, D. Naccache, M. Tunstall, and C. Whelan, The Sorcerer's Apprentice Guide to Fault Attacks, Proceedings of the IEEE, pp.370-382, 2006.
DOI : 10.1109/JPROC.2005.862424

M. Berthier, J. Bringer, H. Chabanne, T. Le, L. Rivì et al., Idea: Embedded Fault Injection Simulator on Smartcard, ESSoS, pp.222-229, 2014.
DOI : 10.1007/978-3-319-04897-0_15

URL : https://hal.archives-ouvertes.fr/hal-01099996

M. Potet, L. Mounier, M. Puys, and L. Dureuil, Lazart: A Symbolic Approach for Evaluation the Robustness of Secured Codes against Control Flow Injections, 2014 IEEE Seventh International Conference on Software Testing, Verification and Validation, 2014.
DOI : 10.1109/ICST.2014.34

URL : https://hal.archives-ouvertes.fr/hal-01229274

J. C. King, Symbolic execution and program testing, Communications of the ACM, vol.19, issue.7, pp.385-394, 1976.
DOI : 10.1145/360248.360252

C. Cadar, D. Dunbar, D. R. Engler, and . Klee, Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs, OSDI, pp.209-224, 2008.

M. Christofi, Preuves de sécurité outillées d'implémentation cryptographiques, Laboratoire PRiSM, 2013.

L. Folkman, The use of a power analysis for influencing PIN verification on cryptographic smart card. Bakalásk práce, Masarykova univerzita, Fakulta informatiky, 2007.

D. Sauveron, Etude et réalisation d'un environnement d'exprimentation et de modélisation pour la technologie Java Card : applicationàapplicationà la sécurité, 1-Informatique et Mathématiques, 2004.

J. G. Van-woudenberg, M. F. Witteman, and F. Menarini, Practical Optical Fault Injection on Secure Microcontrollers, 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.91-99, 2011.
DOI : 10.1109/FDTC.2011.12