{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T12:26:19Z","timestamp":1756383979425},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319312705"},{"type":"electronic","value":"9783319312712"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31271-2_7","type":"book-chapter","created":{"date-parts":[[2016,3,9]],"date-time":"2016-03-09T08:33:58Z","timestamp":1457512438000},"page":"107-124","source":"Crossref","is-referenced-by-count":26,"title":["From Code Review to Fault Injection Attacks: Filling the Gap Using Fault Model Inference"],"prefix":"10.1007","author":[{"given":"Louis","family":"Dureuil","sequence":"first","affiliation":[]},{"given":"Marie-Laure","family":"Potet","sequence":"additional","affiliation":[]},{"given":"Philippe","family":"de Choudens","sequence":"additional","affiliation":[]},{"given":"C\u00e9cile","family":"Dumas","sequence":"additional","affiliation":[]},{"given":"Jessy","family":"Cl\u00e9di\u00e8re","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,10]]},"reference":[{"key":"7_CR1","doi-asserted-by":"publisher","first-page":"23: 1","DOI":"10.1145\/1749608.1749612","volume":"32","author":"G Balakrishnan","year":"2010","unstructured":"Balakrishnan, G., Reps, T.: WYSINWYX: what you see is not what you eXecute. ACM Trans. Programm. Lang. Syst. 32, 23: 1\u201323: 84 (2010)","journal-title":"ACM Trans. Programm. Lang. Syst."},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Bar-El, H., Choukri, H., Naccache, D., Tunstall, M., Whelan, C.: The Sorcerer\u2019s apprentice guide to fault attacks. In: Proceedings of the IEEE, vol. 94, pp. 370\u2013382. IEEE (2006)","DOI":"10.1109\/JPROC.2005.862424"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Barthe, G., Dupressoir, F., Fouque, P.-A., Gr\u00e9goire, B., Zapalowicz, J.-C.: Synthesis of fault attacks on cryptographic implementations. In: CCS 2014: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp. 1016\u20131027. ACM, New York (2014)","DOI":"10.1145\/2660267.2660304"},{"key":"7_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/978-3-319-04897-0_15","volume-title":"Engineering Secure Software and Systems","author":"M Berthier","year":"2014","unstructured":"Berthier, M., Bringer, J., Chabanne, H., Le, T.-H., Rivi\u00e8re, L., Servant, V.: Idea: embedded fault injection simulator on smartcard. In: J\u00fcrjens, J., Piessens, F., Bielova, N. (eds.) ESSoS. LNCS, vol. 8364, pp. 222\u2013229. Springer, Heidelberg (2014)"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Berthom\u00e9, P., Heydemann, K., Kauffmann-Tourkestansky, X., Lalande, J.: High level model of control flow attacks for smart card functional security. In: Seventh International Conference on Availability, Reliability and Security (ARES 2012), pp. 224\u2013229. IEEE (2012)","DOI":"10.1109\/ARES.2012.79"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Bl\u00f6mer, J., Otto, M., Seifert, J.-P.: A new CRT-RSA algorithm secure against bellcore attacks. In: CCS 2003, pp. 311\u2013320. ACM, New York (2003)","DOI":"10.1145\/948109.948151"},{"key":"7_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/3-540-69053-0_4","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"D Boneh","year":"1997","unstructured":"Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 37\u201351. Springer, Heidelberg (1997)"},{"issue":"3","key":"7_CR8","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/s13389-013-0049-3","volume":"3","author":"M Christofi","year":"2013","unstructured":"Christofi, M., Chetali, B., Goubin, L., Vigilant, D.: Formal verification of a CRT-RSA implementation against fault attacks. J. Crypt. Eng. 3(3), 157\u2013167 (2013)","journal-title":"J. Crypt. Eng."},{"key":"7_CR9","unstructured":"JIL: Application of attack potential to smartcards. Technical report Version 2.9, Joint Interpretation Library, January 2013"},{"key":"7_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1007\/978-3-540-72354-7_18","volume-title":"Information Security Theory and Practices","author":"CH Kim","year":"2007","unstructured":"Kim, C.H., Quisquater, J.-J.: Fault attacks for CRT based RSA: new attacks, new results, and new countermeasures. In: Sauveron, D., Markantonakis, K., Bilas, A., Quisquater, J.-J. (eds.) WISTP 2007. LNCS, vol. 4462, pp. 215\u2013228. Springer, Heidelberg (2007)"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Machemie, J.-B., Mazin, C., Lanet, J.-L., Cartigny, J.: SmartCM a smart card fault injection simulator. In: IEEE International Workshop on Information Forensics and Security. IEEE (2011)","DOI":"10.1109\/WIFS.2011.6123124"},{"key":"7_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1007\/978-3-319-16763-3_15","volume-title":"Smart Card Research and Advanced Applications","author":"S Ordas","year":"2015","unstructured":"Ordas, S., Guillaume-Sage, L., Tobich, K., Dutertre, J.-M., Maurine, P.: Evidence of a larger EM-induced fault model. In: Joye, M., Moradi, A. (eds.) CARDIS 2014. LNCS, vol. 8968, pp. 245\u2013259. Springer, Heidelberg (2015)"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Potet, M.-L., Mounier, L., Puys, M., Dureuil, L.: Lazart: A symbolic approach for evaluation the robustness of secured codes against control flow injections. In: Seventh IEEE International Conference on Software Testing, Verification and Validation, ICST, pp. 213\u2013222. IEEE (2014)","DOI":"10.1109\/ICST.2014.34"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Rauzy, P., Guilley, S.: Countermeasures against high-order fault-injection attacks on CRT-RSA. In: FDTC 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp. 68\u201382. IEEE, September 2014","DOI":"10.1109\/FDTC.2014.17"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Rivi\u00e8re, L., Najm, Z., Rauzy, P., Danger, J.-L., Bringer, J., Sauvage, L.: High precision fault injections on the instruction cache of ARMv7-M architectures. In: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, pp. 62\u201367. IEEE, Washington, 5\u20137 May 2015","DOI":"10.1109\/HST.2015.7140238"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Verbauwhede, I., Karaklajic, D., Schmidt, J.: The fault attack jungle - a classification model to guide you. In: Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pp. 3\u20138. IEEE (2011)","DOI":"10.1109\/FDTC.2011.13"}],"container-title":["Lecture Notes in Computer Science","Smart Card Research and Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31271-2_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T13:52:44Z","timestamp":1559397164000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31271-2_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319312705","9783319312712"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31271-2_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}