Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs, OSDI, pp.209-224, 2008. ,
A new CRT-RSA algorithm secure against bellcore attacks, CCS '03, pp.311-320, 2003. ,
The Fault Attack Jungle - A Classification Model to Guide You, 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.3-8, 2011. ,
DOI : 10.1109/FDTC.2011.13
High Level Model of Control Flow Attacks for Smart Card Functional Security, 2012 Seventh International Conference on Availability, Reliability and Security, pp.224-229, 2012. ,
DOI : 10.1109/ARES.2012.79
Preuves de sécurité outillées d'implémentation cryptographiques, Laboratoire PRiSM, 2013. ,
The sorcerer's apprentice guide to fault attacks, 2004. ,
An Analysis and Survey of the Development of Mutation Testing, IEEE Transactions on Software Engineering, vol.37, issue.5, pp.649-678, 2011. ,
DOI : 10.1109/TSE.2010.62
SmartCM a smart card fault injection simulator, 2011 IEEE International Workshop on Information Forensics and Security, 2011. ,
DOI : 10.1109/WIFS.2011.6123124
URL : https://hal.archives-ouvertes.fr/hal-00685220
Analyses sécuritaires de code de cartè a puce sous attaques physiques simulées, THESE, 2012. ,
The KLEE symbolic virtual machine JC101-12C: Defending against attacks, 2008. ,
Evaluation of Countermeasures Against Fault Attacks on Smart Cards, International Journal of Security and Its Applications, vol.5, issue.2, pp.49-61, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00685237
Higher Order Mutation Testing, Information and Software Technology, vol.51, issue.10, pp.1379-1393, 2009. ,
DOI : 10.1016/j.infsof.2009.04.016
Automating structural testing of C programs: Experience with PathCrawler, 2009 ICSE Workshop on Automation of Software Test, 2009. ,
DOI : 10.1109/IWAST.2009.5069043
A Decision Procedure for Bit-Vectors and Arrays, CAV, pp.519-531, 2007. ,
DOI : 10.1007/978-3-540-73368-3_52
Industrial application of concolic testing approach: A case study on libexif by using CREST-BV and KLEE, 2012 34th International Conference on Software Engineering (ICSE), pp.1143-1152, 2012. ,
DOI : 10.1109/ICSE.2012.6227105
Symbolic execution for software testing, Communications of the ACM, vol.56, issue.2, pp.82-90, 2013. ,
DOI : 10.1145/2408776.2408795
Automatic Mutation Test Case Generation via Dynamic Symbolic Execution, 2010 IEEE 21st International Symposium on Software Reliability Engineering, pp.121-130, 2010. ,
DOI : 10.1109/ISSRE.2010.38
Strong higher order mutationbased test data generation, SIGSOFT FSE, pp.212-222, 2011. ,
DOI : 10.1145/2025113.2025144
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.687.2624
Formal verification of a CRT-RSA implementation against fault attacks, Journal of Cryptographic Engineering, vol.2009, issue.3, pp.157-167, 2013. ,
DOI : 10.1007/s13389-013-0049-3
Frama-c -a software analysis perspective, SEFM, 2012, pp.233-247 ,
WYSINWYX, ACM Transactions on Programming Languages and Systems, vol.32, issue.6, pp.1-2384, 2010. ,
DOI : 10.1145/1749608.1749612