C. Cadar, D. Dunbar, and D. R. Engler, Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs, OSDI, pp.209-224, 2008.

J. Blömer, M. Otto, and J. Seifert, A new CRT-RSA algorithm secure against bellcore attacks, CCS '03, pp.311-320, 2003.

I. Verbauwhede, D. Karaklajic, and J. Schmidt, The Fault Attack Jungle - A Classification Model to Guide You, 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.3-8, 2011.
DOI : 10.1109/FDTC.2011.13

P. Berthomé, K. Heydemann, X. Kauffmann-tourkestansky, and J. Lalande, High Level Model of Control Flow Attacks for Smart Card Functional Security, 2012 Seventh International Conference on Availability, Reliability and Security, pp.224-229, 2012.
DOI : 10.1109/ARES.2012.79

M. Christofi, Preuves de sécurité outillées d'implémentation cryptographiques, Laboratoire PRiSM, 2013.

H. B. Hamid, H. Choukri, D. N. Tunstall, and C. Whelan, The sorcerer's apprentice guide to fault attacks, 2004.

Y. Jia and M. Harman, An Analysis and Survey of the Development of Mutation Testing, IEEE Transactions on Software Engineering, vol.37, issue.5, pp.649-678, 2011.
DOI : 10.1109/TSE.2010.62

J. Machemie, C. Mazin, J. Lanet, and J. Cartigny, SmartCM a smart card fault injection simulator, 2011 IEEE International Workshop on Information Forensics and Security, 2011.
DOI : 10.1109/WIFS.2011.6123124

URL : https://hal.archives-ouvertes.fr/hal-00685220

X. Kauffmann-tourkestansky, Analyses sécuritaires de code de cartè a puce sous attaques physiques simulées, THESE, 2012.

V. Eric, The KLEE symbolic virtual machine JC101-12C: Defending against attacks, 2008.

A. Sere, J. Lanet, and J. Iguchi-cartigny, Evaluation of Countermeasures Against Fault Attacks on Smart Cards, International Journal of Security and Its Applications, vol.5, issue.2, pp.49-61, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00685237

Y. Jia and M. Harman, Higher Order Mutation Testing, Information and Software Technology, vol.51, issue.10, pp.1379-1393, 2009.
DOI : 10.1016/j.infsof.2009.04.016

B. Botella, M. Delahaye, S. Hong-tuan-ha, N. Kosmatov, P. Mouy et al., Automating structural testing of C programs: Experience with PathCrawler, 2009 ICSE Workshop on Automation of Software Test, 2009.
DOI : 10.1109/IWAST.2009.5069043

V. Ganesh and D. L. Dill, A Decision Procedure for Bit-Vectors and Arrays, CAV, pp.519-531, 2007.
DOI : 10.1007/978-3-540-73368-3_52

Y. Kim, M. Kim, Y. J. Kim, and Y. Jang, Industrial application of concolic testing approach: A case study on libexif by using CREST-BV and KLEE, 2012 34th International Conference on Software Engineering (ICSE), pp.1143-1152, 2012.
DOI : 10.1109/ICSE.2012.6227105

C. Cadar and K. Sen, Symbolic execution for software testing, Communications of the ACM, vol.56, issue.2, pp.82-90, 2013.
DOI : 10.1145/2408776.2408795

M. Papadakis and N. Malevris, Automatic Mutation Test Case Generation via Dynamic Symbolic Execution, 2010 IEEE 21st International Symposium on Software Reliability Engineering, pp.121-130, 2010.
DOI : 10.1109/ISSRE.2010.38

M. Harman, Y. Jia, and W. B. Langdon, Strong higher order mutationbased test data generation, SIGSOFT FSE, pp.212-222, 2011.
DOI : 10.1145/2025113.2025144

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.687.2624

M. Christofi, B. Chetali, L. Goubin, and D. Vigilant, Formal verification of a CRT-RSA implementation against fault attacks, Journal of Cryptographic Engineering, vol.2009, issue.3, pp.157-167, 2013.
DOI : 10.1007/s13389-013-0049-3

P. Cuoq, F. Kirchner, N. Kosmatov, V. Prevosto, J. Signoles et al., Frama-c -a software analysis perspective, SEFM, 2012, pp.233-247

G. Balakrishnan and T. Reps, WYSINWYX, ACM Transactions on Programming Languages and Systems, vol.32, issue.6, pp.1-2384, 2010.
DOI : 10.1145/1749608.1749612