{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T12:09:10Z","timestamp":1771330150927,"version":"3.50.1"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319454764","type":"print"},{"value":"9783319454771","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45477-1_1","type":"book-chapter","created":{"date-parts":[[2016,9,3]],"date-time":"2016-09-03T01:34:41Z","timestamp":1472866481000},"page":"3-11","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":31,"title":["FISSC: A Fault Injection and Simulation Secure\u00a0Collection"],"prefix":"10.1007","author":[{"given":"Louis","family":"Dureuil","sequence":"first","affiliation":[]},{"given":"Guillaume","family":"Petiot","sequence":"additional","affiliation":[]},{"given":"Marie-Laure","family":"Potet","sequence":"additional","affiliation":[]},{"given":"Thanh-Ha","family":"Le","sequence":"additional","affiliation":[]},{"given":"Aude","family":"Crohen","sequence":"additional","affiliation":[]},{"given":"Philippe","family":"de Choudens","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,4]]},"reference":[{"key":"1_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/BFb0028165","volume-title":"Security Protocols","author":"R Anderson","year":"1998","unstructured":"Anderson, R., Kuhn, M.: Low cost attacks on tamper resistant devices. In: Christianson, B., Crispo, B., Lomas, M., Roe, M. (eds.) Security Protocols 1997. LNCS, vol. 1361, pp. 125\u2013136. Springer, Heidelberg (1998)"},{"key":"1_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-642-12510-2_11","volume-title":"Smart Card Research and Advanced Application","author":"G Barbu","year":"2010","unstructured":"Barbu, G., Thiebeauld, H., Guerin, V.: Attacks on Java card 3.0 combining fault and logical attacks. In: Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) CARDIS 2010. LNCS, vol. 6035, pp. 148\u2013163. Springer, Heidelberg (2010)"},{"issue":"11","key":"1_CR3","doi-asserted-by":"publisher","first-page":"3056","DOI":"10.1109\/JPROC.2012.2188769","volume":"100","author":"A Barenghi","year":"2012","unstructured":"Barenghi, A., Breveglieri, L., Koren, I., Naccache, D.: Fault injection attacks on cryptographic devices: theory, practice, and countermeasures. Proc. IEEE 100(11), 3056\u20133076 (2012)","journal-title":"Proc. IEEE"},{"key":"1_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/978-3-319-04897-0_15","volume-title":"Engineering Secure Software and Systems","author":"M Berthier","year":"2014","unstructured":"Berthier, M., Bringer, J., Chabanne, H., Le, T.-H., Rivi\u00e8re, L., Servant, V.: Idea: embedded fault injection simulator on smartcard. In: J\u00fcrjens, J., Piessens, F., Bielova, N. (eds.) ESSoS. LNCS, vol. 8364, pp. 222\u2013229. Springer, Heidelberg (2014)"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Berthom\u00e9, P., Heydemann, K., Kauffmann-Tourkestansky, X., Lalande, J.: High level model of control flow attacks for smart card functional security. In: ARES 2012, pp. 224\u2013229. IEEE (2012)","DOI":"10.1109\/ARES.2012.79"},{"key":"1_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/3-540-69053-0_4","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"D Boneh","year":"1997","unstructured":"Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 37\u201351. Springer, Heidelberg (1997)"},{"key":"1_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/978-3-319-31271-2_7","volume-title":"Smart Card Research and Advanced Applications","author":"L Dureuil","year":"2015","unstructured":"Dureuil, L., Potet, M.-L., de Choudens, P., Dumas, C., Cl\u00e9di\u00e8re, J.: From code review to fault injection attacks: filling the gap using fault model inference. In: Homma, N., Medwed, M. (eds.) CARDIS 2015. LNCS, vol. 9514, pp. 107\u2013124. Springer, Heidelberg (2015). doi:\n                      10.1007\/978-3-319-31271-2_7"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Holler, A., Krieg, A., Rauter, T., Iber, J., Kreiner, C.: Qemu-based fault injection for a system-level analysis of software countermeasures against fault attacks. In: Digital System Design (DSD), Euromicro 15. pp. 530\u2013533. IEEE (2015)","DOI":"10.1109\/DSD.2015.79"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Lalande, J., Heydemann, K., Berthom\u00e9, P.: Software countermeasures for control flow integrity of smart card C codes. In: Proceedings of the 19th European Symposium on Research in Computer Security, ESORICS 2014, pp. 200\u2013218 (2014)","DOI":"10.1007\/978-3-319-11212-1_12"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Machemie, J.B., Mazin, C., Lanet, J.L., Cartigny, J.: SmartCM a smart card fault injection simulator. In: IEEE International Workshop on Information Forensics and Security. IEEE (2011)","DOI":"10.1109\/WIFS.2011.6123124"},{"key":"1_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"468","DOI":"10.1007\/978-3-642-11957-6_25","volume-title":"Programming Languages and Systems","author":"ML Meola","year":"2010","unstructured":"Meola, M.L., Walker, D.: Faulty logic: reasoning about fault tolerant programs. In: Gordon, A.D. (ed.) ESOP 2010. LNCS, vol. 6012, pp. 468\u2013487. Springer, Heidelberg (2010)"},{"issue":"3","key":"1_CR12","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/s13389-014-0077-7","volume":"4","author":"N Moro","year":"2014","unstructured":"Moro, N., Heydemann, K., Encrenaz, E., Robisson, B.: Formal verification of a software countermeasure against instruction skip attacks. J. Cryptographic Eng. 4(3), 145\u2013156 (2014)","journal-title":"J. Cryptographic Eng."},{"key":"1_CR13","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-642-01244-0_6","volume-title":"Emerging Challenges for Security, Privacy and Trust","author":"K Pattabiraman","year":"2009","unstructured":"Pattabiraman, K., Nakka, N., Kalbarczyk, Z., Iyer, R.: Discovering application-level insider attacks using symbolic execution. In: Gritzalis, D., Lopez, J. (eds.) SEC 2009. IFIP AICT, vol. 297, pp. 63\u201375. Springer, Heidelberg (2009)"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Potet, M.L., Mounier, L., Puys, M., Dureuil, L.: Lazart: a symbolic approach for evaluation the robustness of secured codes against control flow injections. In: Seventh IEEE International Conference on Software Testing, Verification and Validation, ICST 2014, pp. 213\u2013222. IEEE (2014)","DOI":"10.1109\/ICST.2014.34"},{"issue":"2","key":"1_CR15","first-page":"49","volume":"5","author":"A S\u00e9r\u00e9","year":"2011","unstructured":"S\u00e9r\u00e9, A., Lanet, J.L., Iguchi-Cartigny, J.: Evaluation of countermeasures against fault attacks on smart cards. Int. J. Secur. Appl. 5(2), 49\u201360 (2011)","journal-title":"Int. J. Secur. Appl."},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Van Woudenberg, J.G., Witteman, M.F., Menarini, F.: Practical optical fault injection on secure microcontrollers. In: 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pp. 91\u201399. IEEE (2011)","DOI":"10.1109\/FDTC.2011.12"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45477-1_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T00:57:50Z","timestamp":1558313870000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-45477-1_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319454764","9783319454771"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45477-1_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"4 September 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAFECOMP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Safety, Reliability, and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Trondheim","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Norway","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"35","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"safecomp2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}