{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T14:13:28Z","timestamp":1742393608896},"reference-count":67,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,10,24]],"date-time":"2019-10-24T00:00:00Z","timestamp":1571875200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,10,24]],"date-time":"2019-10-24T00:00:00Z","timestamp":1571875200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1007\/s11416-019-00340-z","type":"journal-article","created":{"date-parts":[[2019,10,25]],"date-time":"2019-10-25T01:21:25Z","timestamp":1571966485000},"page":"103-124","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Hiding a fault enabled virus through code construction"],"prefix":"10.1007","volume":"16","author":[{"given":"Samiya","family":"Hamadouche","sequence":"first","affiliation":[]},{"given":"Jean-Louis","family":"Lanet","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Mezghiche","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,24]]},"reference":[{"issue":"5","key":"340_CR1","doi-asserted-by":"publisher","first-page":"464","DOI":"10.1109\/T-C.1972.223542","volume":"100","author":"DB Armstrong","year":"1972","unstructured":"Armstrong, D.B.: A deductive method for simulating faults in logic circuits. IEEE Trans. Comput. 100(5), 464\u2013471 (1972)","journal-title":"IEEE Trans. Comput."},{"issue":"1","key":"340_CR2","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1145\/1352322.1352245","volume":"40","author":"MW Bailey","year":"2008","unstructured":"Bailey, M.W., Coleman, C.L., Davidson, J.W.: Defense against the dark arts. ACM SIGCSE Bull. 40(1), 315\u2013319 (2008)","journal-title":"ACM SIGCSE Bull."},{"key":"340_CR3","unstructured":"Balakrishnan, A., Schulze, C.: Code obfuscation literature survey (2005)"},{"issue":"2","key":"340_CR4","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1109\/JPROC.2005.862424","volume":"94","author":"H Bar-El","year":"2006","unstructured":"Bar-El, H., Choukri, H., Naccache, D., Tunstall, M., Whelan, C.: The sorcerer\u2019s apprentice guide to fault attacks. Proc. IEEE 94(2), 370\u2013382 (2006)","journal-title":"Proc. IEEE"},{"key":"340_CR5","doi-asserted-by":"crossref","unstructured":"Barbu G., Duc G., Hoogvorst P.: Java Card operand stack: fault attacks, combined attacks and countermeasures. In: International Conference on Smart Card Research and Advanced Applications. Springer, pp. 297\u2013313 (2011)","DOI":"10.1007\/978-3-642-27257-8_19"},{"key":"340_CR6","doi-asserted-by":"crossref","unstructured":"Barbu, G., Thiebeauld, H., Guerin, V.: Attacks on Java Card 3.0 combining fault and logical attacks. In: International Conference on Smart Card Research and Advanced Applications. Springer, pp. 148\u2013163 (2010)","DOI":"10.1007\/978-3-642-12510-2_11"},{"key":"340_CR7","doi-asserted-by":"crossref","unstructured":"Barenghi, A., Bertoni, G., Parrinello, E., Pelosi, G.: Low voltage fault attacks on the RSA cryptosystem. In: Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC). IEEE, pp. 23\u201331 (2009)","DOI":"10.1109\/FDTC.2009.30"},{"issue":"1","key":"340_CR8","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1053283.1053286","volume":"8","author":"EG Barrantes","year":"2005","unstructured":"Barrantes, E.G., Ackley, D.H., Forrest, S., Stefanovi\u0107, D.: Randomized instruction set emulation. ACM Trans. Inf. Syst. Secur. (TISSEC) 8(1), 3\u201340 (2005)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"340_CR9","unstructured":"Bart\u00e1k, R.: Constraint programming: in pursuit of the holy grail. In: Proceedings of the Week of Doctoral Students (WDS99), vol.\u00a04. MatFyzPress Prague, pp. 555\u2013564 (1999)"},{"key":"340_CR10","volume-title":"Constraint Propagation and Backtracking-Based Search","author":"R Bartak","year":"2005","unstructured":"Bartak, R.: Constraint Propagation and Backtracking-Based Search. Charles Universit\u00e4t, Prag (2005)"},{"issue":"3","key":"340_CR11","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1017\/S0269888910000202","volume":"25","author":"R Bart\u00e1k","year":"2010","unstructured":"Bart\u00e1k, R., Salido, M.A., Rossi, F.: New trends in constraint satisfaction, planning, and scheduling: a survey. Knowl. Eng. Rev. 25(3), 249\u2013279 (2010)","journal-title":"Knowl. Eng. Rev."},{"key":"340_CR12","doi-asserted-by":"crossref","unstructured":"Bl\u00f6mer, J., Otto, M., Seifert, J.-P.: A new CRT-RSA algorithm secure against bellcore attacks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security. ACM, pp. 311\u2013320 (2003)","DOI":"10.1145\/948109.948151"},{"issue":"3","key":"340_CR13","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s11416-008-0084-2","volume":"4","author":"J-M Borello","year":"2008","unstructured":"Borello, J.-M., M\u00e9, L.: Code obfuscation techniques for metamorphic viruses. J. Comput. Virol. 4(3), 211\u2013220 (2008)","journal-title":"J. Comput. Virol."},{"key":"340_CR14","doi-asserted-by":"crossref","unstructured":"Bouffard, G., Iguchi-Cartigny, J., Lanet, J.-L.: Combined software and hardware attacks on the Java Card control flow. In: International Conference on Smart Card Research and Advanced Applications. Springer, pp. 283\u2013296 (2011)","DOI":"10.1007\/978-3-642-27257-8_18"},{"key":"340_CR15","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.cose.2015.01.004","volume":"50","author":"G Bouffard","year":"2015","unstructured":"Bouffard, G., Lanet, J.-L.: The ultimate control flow transfer in a Java based smart card. Comput. Secur. 50, 33\u201346 (2015)","journal-title":"Comput. Secur."},{"key":"340_CR16","doi-asserted-by":"crossref","unstructured":"Bouffard, G., Lanet, J.-L., Machemie, J.-B., Poichotte, J.-Y., Wary, J.-P.: Evaluation of the ability to transform SIM applications into hostile applications. In: International Conference on Smart Card Research and Advanced Applications. Springer, pp. 1\u201317 (2011)","DOI":"10.1007\/978-3-642-27257-8_1"},{"issue":"3","key":"340_CR17","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1016\/S0377-2217(98)00364-6","volume":"119","author":"SC Brailsford","year":"1999","unstructured":"Brailsford, S.C., Potts, C.N., Smith, B.M.: Constraint satisfaction problems: algorithms and applications. Eur. J. Oper. Res. 119(3), 557\u2013581 (1999)","journal-title":"Eur. J. Oper. Res."},{"key":"340_CR18","doi-asserted-by":"crossref","unstructured":"Bukasa, S,K., Lashermes, R., Lanet, J.-L., Leqay, A.: Let\u2019s shock our IoT\u2019s heart: ARMv7-M under (fault) attacks. In: Proceedings of the 13th International Conference on Availability, Reliability and Security. ACM, pp. 33 (2018)","DOI":"10.1145\/3230833.3230842"},{"key":"340_CR19","unstructured":"Cappaert, J.: Code obfuscation techniques for software protection. PhD thesis, University of Katholieke Leuven (2012)"},{"key":"340_CR20","doi-asserted-by":"crossref","unstructured":"Charreteur, F., Gotlieb, A.: Constraint-based test input generation for Java bytecode. In: IEEE 21st International Symposium on Software Reliability Engineering (ISSRE). IEEE, pp. 131\u2013140 (2010)","DOI":"10.1109\/ISSRE.2010.26"},{"key":"340_CR21","unstructured":"Collberg, C., Thomborson, C., Low, D.: A taxonomy of obfuscating transformations. Technical report, Department of Computer Science, The University of Auckland, New Zealand (1997)"},{"key":"340_CR22","unstructured":"Drape, S.: Intellectual property protection using obfuscation. In: Proceedings of SAS 2009, vol. 4779, pp. 133\u2013144 (2009)"},{"key":"340_CR23","unstructured":"Eyrolles, N.: Obfuscation with mixed boolean-arithmetic expressions: reconstruction, analysis and simplification tools. PhD thesis, University of Paris-Saclay (2017)"},{"key":"340_CR24","unstructured":"Faruki, P., Fereidooni, H., Laxmi, V., Conti, M., Gaur, M.: Android code protection via obfuscation techniques: past, present and future directions. arXiv preprint \n                  arXiv:1611.10231\n                  \n                 (2016)"},{"issue":"02","key":"340_CR25","first-page":"56","volume":"5","author":"E Gandotra","year":"2014","unstructured":"Gandotra, E., Bansal, D., Sofat, S.: Malware analysis and classification: a survey. J. Inf. Secur. 5(02), 56 (2014)","journal-title":"J. Inf. Secur."},{"key":"340_CR26","doi-asserted-by":"crossref","unstructured":"Giraud, C., Thiebeauld, H.: A survey on fault attacks. In: Smart Card Research and Advanced Applications VI. Springer, pp. 159\u2013176 (2004)","DOI":"10.1007\/1-4020-8147-2_11"},{"key":"340_CR27","doi-asserted-by":"crossref","unstructured":"Guilley, S., Sauvage, L., Danger, J.-L., Selmane, N., Pacalet, R.: Silicon-level solutions to counteract passive and active attacks. In: FDTC. IEEE-CS, pp. 3\u201317 (2008)","DOI":"10.1109\/FDTC.2008.18"},{"key":"340_CR28","doi-asserted-by":"publisher","first-page":"1647","DOI":"10.1109\/23.211348","volume":"39","author":"DH Habing","year":"1992","unstructured":"Habing, D.H.: The use of lasers to simulate radiation-induced transients in semiconductor devices and circuits. IEEE Trans. Nuclear Sci. 39, 1647\u20131653 (1992)","journal-title":"IEEE Trans. Nuclear Sci."},{"issue":"2\u20133","key":"340_CR29","first-page":"130","volume":"18","author":"S Hamadouche","year":"2013","unstructured":"Hamadouche, S., Lanet, J.-L.: Virus in a smart card: Myth or reality? J. Inf. Secur. Appl. 18(2\u20133), 130\u2013137 (2013)","journal-title":"J. Inf. Secur. Appl."},{"key":"340_CR30","unstructured":"Hamadouche, S., Mezghiche, M., Gotlieb, A., Lanet, J.-L.: Vers une approche de construction de virus pour cartes \u00e0 puce bas\u00e9e sur la r\u00e9solution de contraintes. Actes de la 13 \u00e8me \u00e9dition d\u2019AFADL, Atelier Francophone sur les Approches Formelles dans l\u2019Assistance au D\u00e9veloppement de Logiciels (2014)"},{"key":"340_CR31","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1109\/PGEC.1967.264644","volume":"4","author":"FH Hardie","year":"1967","unstructured":"Hardie, F.H., Suhocki, R.J.: Design and use of fault simulation for saturn computer design. IEEE Trans. Electron. Comput. 4, 412\u2013429 (1967)","journal-title":"IEEE Trans. Electron. Comput."},{"key":"340_CR32","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.infsof.2018.07.007","volume":"104","author":"S Hosseinzadeh","year":"2018","unstructured":"Hosseinzadeh, S., Rauti, S., Laur\u00e9n, S., M\u00e4kel\u00e4, J.-M., Holvitie, J., Hyrynsalmi, S., Lepp\u00e4nen, V.: Diversification and obfuscation techniques for software security: a systematic literature review. Inf. Softw. Technol. 104, 72\u201393 (2018)","journal-title":"Inf. Softw. Technol."},{"key":"340_CR33","doi-asserted-by":"crossref","unstructured":"Hutter, M., Schmidt, J.-M.: The temperature side channel and heating fault attacks. In: International Conference on Smart Card Research and Advanced Applications. Springer, pp. 219\u2013235 (2013)","DOI":"10.1007\/978-3-319-14123-7_15"},{"issue":"12","key":"340_CR34","doi-asserted-by":"publisher","first-page":"2295","DOI":"10.1109\/TVLSI.2012.2231707","volume":"21","author":"D Karaklaji\u0107","year":"2013","unstructured":"Karaklaji\u0107, D., Schmidt, J.-M., Verbauwhede, I.: Hardware designer\u2019s guide to fault attacks. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 21(12), 2295\u20132306 (2013)","journal-title":"IEEE Trans. Very Large Scale Integr. (VLSI) Syst."},{"key":"340_CR35","doi-asserted-by":"crossref","unstructured":"Kc G.S., Keromytis, A.D., Prevelakis, V.: Countering code-injection attacks with instruction-set randomization. In: Proceedings of the 10th ACM Conference on Computer and Communications Security. ACM, pp. 272\u2013280 (2003)","DOI":"10.1145\/948109.948146"},{"key":"340_CR36","doi-asserted-by":"crossref","unstructured":"Kelly, M.S., Mayes, K., Walker, J.F.: Characterising a CPU fault attack model via run-time data analysis. In: IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE, pp. 79\u201384 (2017)","DOI":"10.1109\/HST.2017.7951802"},{"key":"340_CR37","doi-asserted-by":"crossref","unstructured":"Korak, T., Hoefler, M.: On the effects of clock and power supply tampering on two microcontroller platforms. In: 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC). IEEE, pp. 8\u201317 (2014)","DOI":"10.1109\/FDTC.2014.11"},{"issue":"1","key":"340_CR38","first-page":"32","volume":"13","author":"V Kumar","year":"1992","unstructured":"Kumar, V.: Algorithms for constraint-satisfaction problems: a survey. AI Mag. 13(1), 32 (1992)","journal-title":"AI Mag."},{"key":"340_CR39","doi-asserted-by":"crossref","unstructured":"Lancia, J.: Java Card combined attacks with localization-agnostic fault injection. In: International Conference on Smart Card Research and Advanced Applications. Springer, pp. 31\u201345 (2012)","DOI":"10.1007\/978-3-642-37288-9_3"},{"issue":"3","key":"340_CR40","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/s11416-010-0148-y","volume":"7","author":"D Lin","year":"2011","unstructured":"Lin, D., Stamp, M.: Hunting for undetectable metamorphic viruses. J. Comput. Virol. 7(3), 201\u2013214 (2011)","journal-title":"J. Comput. Virol."},{"key":"340_CR41","unstructured":"Low, D.: Java control flow obfuscation. Master\u2019s thesis, University of Auckland (1998)"},{"key":"340_CR42","doi-asserted-by":"publisher","first-page":"689","DOI":"10.1109\/TC.1978.1675175","volume":"8","author":"PR Menon","year":"1978","unstructured":"Menon, P.R., Chappell, S.G.: Deductive fault simulation with functional blocks. IEEE Trans. Comput. 8, 689\u2013695 (1978)","journal-title":"IEEE Trans. Comput."},{"issue":"1","key":"340_CR43","first-page":"1","volume":"18","author":"A Mesbah","year":"2018","unstructured":"Mesbah, A., Lanet, J.-L., Mezghiche, M.: Reverse engineering Java Card and vulnerability exploitation: a shortcut to ROM. Int. J. Inf. Secur. 18(1), 1\u201316 (2018)","journal-title":"Int. J. Inf. Secur."},{"key":"340_CR44","doi-asserted-by":"crossref","unstructured":"Mesbah, A., Mezghiche, M., Lanet, J.-L.: Persistent fault injection attack from white-box to black-box. In: 5th International Conference on Electrical Engineering Boumerdes (ICEE-B). IEEE, pp. 1\u20136 (2017)","DOI":"10.1109\/ICEE-B.2017.8192164"},{"issue":"4","key":"340_CR45","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1023\/A:1011039901653","volume":"15","author":"I Miguel","year":"2001","unstructured":"Miguel, I., Shen, Q.: Solution techniques for constraint satisfaction problems: foundations. Artif. Intell. Rev. 15(4), 243\u2013267 (2001)","journal-title":"Artif. Intell. Rev."},{"key":"340_CR46","doi-asserted-by":"crossref","unstructured":"Moro, N., Dehbaoui, A., Heydemann, K., Robisson, B., Encrenaz, E.: Electromagnetic fault injection: towards a fault model on a 32-bit microcontroller. In: 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography. IEEE, pp. 77\u201388 (2013)","DOI":"10.1109\/FDTC.2013.9"},{"issue":"1","key":"340_CR47","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/s13389-016-0136-3","volume":"7","author":"S Nashimoto","year":"2017","unstructured":"Nashimoto, S., Homma, N., Hayashi, Y., Takahashi, J., Fuji, H., Aoki, T.: Buffer overflow attack with multiple fault injection and a proven countermeasure. J. Cryptogr. Eng. 7(1), 35\u201346 (2017)","journal-title":"J. Cryptogr. Eng."},{"key":"340_CR48","unstructured":"Oracle: Java Card\u2122Platform, Version 3.0.5 Classic Edition : Virtual Machine Specification. Oracle America (2015)"},{"key":"340_CR49","unstructured":"Pearson, J., Jeavons, P.G.: A survey of tractable constraint satisfaction problems. Technical report, Technical Report CSD-TR-97-15, Royal Holloway, University of London (1997)"},{"key":"340_CR50","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/978-3-319-44318-8_2","volume-title":"Hardware Security and Trust","author":"R Piscitelli","year":"2017","unstructured":"Piscitelli, R., Bhasin, S., Regazzoni, F.: Fault attacks, injection techniques and tools for simulation. In: Sklavos, N., Chaves, R., Di Natale, G., Regazzoni, F. (eds.) Hardware Security and Trust, pp. 27\u201347. Springer, Cham (2017)"},{"issue":"8","key":"340_CR51","first-page":"74","volume":"12","author":"BB Rad","year":"2012","unstructured":"Rad, B.B., Masrom, M., Ibrahim, S.: Camouflage in malware: from encryption to metamorphism. Int. J. Comput. Sci. Netw. Secur. 12(8), 74\u201383 (2012)","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"key":"340_CR52","doi-asserted-by":"crossref","unstructured":"Riviere, L., Najm, Z., Rauzy, P., Danger, J.-L., Bringer, J., Sauvage, L.: High precision fault injections on the instruction cache of ARMv7-M architectures. arXiv preprint \n                  arXiv:1510.01537\n                  \n                 (2015)","DOI":"10.1109\/HST.2015.7140238"},{"key":"340_CR53","unstructured":"Schmidt, J.-M., Hutter, M.: Optical and EM fault-attacks on CRT-based RSA: Concrete results. na (2007)"},{"issue":"2","key":"340_CR54","first-page":"49","volume":"5","author":"AAK Sere","year":"2011","unstructured":"Sere, A.A.K., Iguchi-Cartigny, J., Lanet, J.-L.: Evaluation of countermeasures against fault. Int. J. Secur. Appl. 5(2), 49\u201360 (2011)","journal-title":"Int. J. Secur. Appl."},{"key":"340_CR55","doi-asserted-by":"crossref","unstructured":"Sharma, A., Sahay, S.K.: Evolution and detection of polymorphic and metamorphic malwares: a survey. arXiv preprint \n                  arXiv:1406.7061\n                  \n                 (2014)","DOI":"10.5120\/15544-4098"},{"issue":"3","key":"340_CR56","first-page":"100","volume":"7","author":"J Singh","year":"2018","unstructured":"Singh, J., Singh, J.: Challenge of malware analysis: malware obfuscation techniques. Int. J. Inf. Secur. Sci. 7(3), 100\u2013110 (2018)","journal-title":"Int. J. Inf. Secur. Sci."},{"issue":"10","key":"340_CR57","first-page":"28","volume":"122","author":"S Singla","year":"2015","unstructured":"Singla, S., Gandotra, E., Bansal, D., Sofat, S.: Detecting and classifying morphed malwares: a survey. Int. J. Comput. Appl. 122(10), 28\u201333 (2015)","journal-title":"Int. J. Comput. Appl."},{"key":"340_CR58","doi-asserted-by":"crossref","unstructured":"Skorobogatov, S.P., Anderson, R.J.: Optical fault induction attacks. In: International Workshop on Cryptographic Hardware and Embedded Systems. Springer, pp. 2\u201312 (2002)","DOI":"10.1007\/3-540-36400-5_2"},{"key":"340_CR59","doi-asserted-by":"crossref","unstructured":"Timmers, N., Spruyt, A., Witteman, M.: Controlling PC on ARM using fault injection. In: Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC). IEEE, pp. 25\u201335 (2016)","DOI":"10.1109\/FDTC.2016.18"},{"key":"340_CR60","volume-title":"Foundations of Constraint Satisfaction","author":"E Tsang","year":"1995","unstructured":"Tsang, E.: Foundations of Constraint Satisfaction. Academic Press Limited, Cambridge (1995)"},{"key":"340_CR61","doi-asserted-by":"crossref","unstructured":"Ulrich, E.G., Baker, T., Williams, L.R.: Fault-test analysis techniques based on logic simulation. In: Proceedings of the 9th Design Automation Workshop. ACM, pp. 111\u2013115 (1972)","DOI":"10.1145\/800153.804936"},{"key":"340_CR62","doi-asserted-by":"crossref","unstructured":"Vetillard, E., Ferrari, A.: Combined attacks and countermeasures. In: International Conference on Smart Card Research and Advanced Applications. Springer, pp. 133\u2013147 (2010)","DOI":"10.1007\/978-3-642-12510-2_10"},{"key":"340_CR63","doi-asserted-by":"crossref","unstructured":"Wagner, D.: Cryptanalysis of a provably secure CRT-RSA algorithm. In: Proceedings of the 11th ACM Conference on Computer and Communications Security. ACM, pp. 92\u201397 (2004)","DOI":"10.1145\/1030083.1030097"},{"key":"340_CR64","unstructured":"Winter, S.: On the utility of higher order fault models for fault injections. PhD thesis, Technische Universit\u00e4t (2015)"},{"key":"340_CR65","unstructured":"Xu, H., Zhou, Y., Kang, Y., Lyu, M.R.: On secure and usable program obfuscation: a survey. arXiv preprint \n                  arXiv:1710.01139\n                  \n                 (2017)"},{"key":"340_CR66","doi-asserted-by":"crossref","unstructured":"You, I., Yim, K.: Malware obfuscation techniques: a brief survey. In: International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA). IEEE, pp. 297\u2013300 (2010)","DOI":"10.1109\/BWCCA.2010.85"},{"issue":"2","key":"340_CR67","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s41635-018-0038-1","volume":"2","author":"B Yuce","year":"2018","unstructured":"Yuce, B., Schaumont, P., Witteman, M.: Fault attacks on secure embedded software: threats, design, and evaluation. J. Hardw. Syst. Secur. 2(2), 1\u201320 (2018)","journal-title":"J. Hardw. Syst. Secur."}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-019-00340-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11416-019-00340-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-019-00340-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,22]],"date-time":"2020-10-22T23:33:16Z","timestamp":1603409596000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11416-019-00340-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,24]]},"references-count":67,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,6]]}},"alternative-id":["340"],"URL":"https:\/\/doi.org\/10.1007\/s11416-019-00340-z","relation":{},"ISSN":["2263-8733"],"issn-type":[{"value":"2263-8733","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,10,24]]},"assertion":[{"value":"19 March 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 October 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 October 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}