{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T02:31:27Z","timestamp":1767839487624,"version":"3.49.0"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319312705","type":"print"},{"value":"9783319312712","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31271-2_10","type":"book-chapter","created":{"date-parts":[[2016,3,9]],"date-time":"2016-03-09T13:33:58Z","timestamp":1457530438000},"page":"161-176","source":"Crossref","is-referenced-by-count":16,"title":["Protecting the Control Flow of Embedded Processors against Fault Attacks"],"prefix":"10.1007","author":[{"given":"Mario","family":"Werner","sequence":"first","affiliation":[]},{"given":"Erich","family":"Wenger","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Mangard","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,10]]},"reference":[{"issue":"1","key":"10_CR1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1609956.1609960","volume":"13","author":"Mart\u00edn Abadi","year":"2009","unstructured":"Abadi, M., Budiu, M., Erlingsson, \u00da., Ligatti, J.: Control-flow integrity principles, implementations, and applications. In: ACM Transactions on Information and System Security (TISSEC), pp. 4:1\u20134:40, November 2009","journal-title":"ACM Transactions on Information and System Security"},{"issue":"12","key":"10_CR2","doi-asserted-by":"publisher","first-page":"1295","DOI":"10.1109\/TVLSI.2006.887799","volume":"14","author":"D Arora","year":"2006","unstructured":"Arora, D., Ravi, S., Raghunathan, A., Jha, N.: Hardware-assisted run-time monitoring for secure program execution on embedded processors. IEEE Trans. VLSI Syst. 14(12), 1295\u20131308 (2006)","journal-title":"IEEE Trans. VLSI Syst."},{"key":"10_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/3-540-69053-0_4","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"D Boneh","year":"1997","unstructured":"Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 37\u201351. Springer, Heidelberg (1997)"},{"key":"10_CR4","unstructured":"Free60.org: (2012). http:\/\/free60.org\/wiki\/Reset_Glitch_Hack"},{"key":"10_CR5","series-title":"Information Security and Cryptography","volume-title":"Fault Analysis in Cryptography","year":"2012","unstructured":"Joye, M., Tunstall, M. (eds.): Fault Analysis in Cryptography. Information Security and Cryptography. Springer, Heidelberg (2012). No. 1619\u20137100"},{"key":"10_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1007\/978-3-319-11212-1_12","volume-title":"Computer Security - ESORICS 2014","author":"J-F Lalande","year":"2014","unstructured":"Lalande, J.-F., Heydemann, K., Berthom\u00e9, P.: Software countermeasures for control flow integrity of smart card C codes. In: Kuty\u0142owski, M., Vaidya, J. (eds.) ICAIS 2014, Part II. LNCS, vol. 8713, pp. 200\u2013218. Springer, Heidelberg (2014)"},{"key":"10_CR7","unstructured":"Namjoo, M.: Techniques for concurrent testing of VLSI processor operation. In: International Test Conference, pp. 461\u2013468. IEEE, November 1982"},{"key":"10_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/3-540-45732-1_26","volume-title":"Computer Safety, Reliability and Security","author":"F Rodr\u00edguez","year":"2002","unstructured":"Rodr\u00edguez, F., Campelo, J.C., Serrano, J.J.: A watchdog processor architecture with minimal performance overhead. In: Anderson, S., Bologna, S., Felici, M. (eds.) SAFECOMP 2002. LNCS, vol. 2434, pp. 261\u2013272. Springer, Heidelberg (2002)"},{"key":"10_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1007\/11599555_63","volume-title":"Embedded Software and Systems","author":"F Rodr\u00edguez","year":"2005","unstructured":"Rodr\u00edguez, F., Serrano, J.J.: Control flow error checking with ISIS. In: Yang, L.T., Zhou, X., Zhao, W., Wu, Z., Zhu, Y., Lin, M. (eds.) ICESS 2005. LNCS, vol. 3820, pp. 659\u2013670. Springer, Heidelberg (2005)"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Wilken, K.D., Shen, J.P.: Continuous signature monitoring: efficient concurrent-detection of processor control errors. In: New Frontiers in Testing, pp. 914\u2013925, September 1988","DOI":"10.1109\/TEST.1988.207880"},{"issue":"6","key":"10_CR11","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1109\/43.55193","volume":"9","author":"KD Wilken","year":"1990","unstructured":"Wilken, K.D., Shen, J.P.: Continuous signature monitoring: low-cost concurrent detection of processor control errors. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 9(6), 629\u2013641 (1990)","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst."},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"van Woudenberg, J.G.J., Witteman, M.F., Menarini, F.: Practical optical fault injection on secure microcontrollers. In: Fault Diagnosis and Tolerance in Cryptography (FDTC), pp. 91\u201399. IEEE, September 2011","DOI":"10.1109\/FDTC.2011.12"},{"key":"10_CR13","unstructured":"Zhang, M., Sekar, R.: Control Flow Integrity for COTS Binaries. In: Proceedings of the 22nd USENIX Conference on Security, pp. 337\u2013352. SEC, USENIX Association, Berkeley, CA (2013)"}],"container-title":["Lecture Notes in Computer Science","Smart Card Research and Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31271-2_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T18:11:48Z","timestamp":1748801508000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31271-2_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319312705","9783319312712"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31271-2_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}