{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T11:43:59Z","timestamp":1767872639667,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,1,20]],"date-time":"2016-01-20T00:00:00Z","timestamp":1453248000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Commissariat \u00e0 l'\u00c9nergie Atomique et aux \u00c9nergies Alternatives"},{"DOI":"10.13039\/501100001665","name":"Agence Nationale de la Recherche","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001665","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,1,20]]},"DOI":"10.1145\/2858930.2858931","type":"proceedings-article","created":{"date-parts":[[2016,1,29]],"date-time":"2016-01-29T15:05:10Z","timestamp":1454079910000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Compilation of a Countermeasure Against Instruction-Skip Fault Attacks"],"prefix":"10.1145","author":[{"given":"Thierno","family":"Barry","sequence":"first","affiliation":[{"name":"Univ. Grenoble Alpes, F-38000 Grenoble, France, CEA, LIST, MINATEC Campus, F-38054 Grenoble, France"}]},{"given":"Damien","family":"Courouss\u00e9","sequence":"additional","affiliation":[{"name":"Univ. Grenoble Alpes, F-38000 Grenoble, France, CEA, LIST, MINATEC Campus, F-38054 Grenoble, France"}]},{"given":"Bruno","family":"Robisson","sequence":"additional","affiliation":[{"name":"CEA-Tech DPACA, France"}]}],"member":"320","published-online":{"date-parts":[[2016,1,20]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"ARM. Cortex-M3 Technical Reference Manual.  ARM. Cortex-M3 Technical Reference Manual."},{"key":"e_1_3_2_1_2_1","unstructured":"G. Balakrishnan T. Reps D. Melski and T. Teitelbaum. Wysinwyx: What you see is not what you execute. In Verified software.  G. Balakrishnan T. Reps D. Melski and T. Teitelbaum. Wysinwyx: What you see is not what you execute. In Verified software."},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the IEEE.","author":"Bar-El H.","unstructured":"H. Bar-El , H. Choukri , D. Naccache , M. Tunstall , and C. Whelan . The sorcerer's apprentice guide to fault attacks . Proceedings of the IEEE. H. Bar-El, H. Choukri, D. Naccache, M. Tunstall, and C. Whelan. The sorcerer's apprentice guide to fault attacks. Proceedings of the IEEE."},{"key":"e_1_3_2_1_4_1","volume-title":"Fault injection attacks on cryptographic devices: Theory, practice, and countermeasures","author":"Barenghi A.","unstructured":"A. Barenghi , L. Breveglieri , I. Koren , and D. Naccache . Fault injection attacks on cryptographic devices: Theory, practice, and countermeasures . IEEE. A. Barenghi, L. Breveglieri, I. Koren, and D. Naccache. Fault injection attacks on cryptographic devices: Theory, practice, and countermeasures. IEEE."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1873548.1873555"},{"key":"e_1_3_2_1_6_1","volume-title":"EUROCRYPT'97","author":"Boneh D.","unstructured":"D. Boneh , R. A. DeMillo , and R. J. Lipton . On the importance of checking cryptographic protocols for faults . In EUROCRYPT'97 . Springer . D. Boneh, R. A. DeMillo, and R. J. Lipton. On the importance of checking cryptographic protocols for faults. In EUROCRYPT'97. Springer."},{"key":"e_1_3_2_1_7_1","unstructured":"Eurosmart. Figures. http:\/\/www.eurosmart.com\/facts-figures.html.  Eurosmart. Figures. http:\/\/www.eurosmart.com\/facts-figures.html."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1128020.1128563"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11212-1_12"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2013.9"},{"key":"e_1_3_2_1_11_1","unstructured":"N. Moro K. Heydemann E. Encrenaz and B. Robisson. Formal verification of a software countermeasure against instruction skip attacks. JCE.  N. Moro K. Heydemann E. Encrenaz and B. Robisson. Formal verification of a software countermeasure against instruction skip attacks. JCE."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2011.13"}],"event":{"name":"CS2 '16: Third Workshop on Cryptography and Security in Computing Systems","location":"Prague Czech Republic","acronym":"CS2 '16","sponsor":["Politecnico di Milano Politecnico di Milano","HiPEAC HiPEAC Network of Excellence"]},"container-title":["Proceedings of the Third Workshop on Cryptography and Security in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2858930.2858931","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2858930.2858931","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:03Z","timestamp":1750227123000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2858930.2858931"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,20]]},"references-count":12,"alternative-id":["10.1145\/2858930.2858931","10.1145\/2858930"],"URL":"https:\/\/doi.org\/10.1145\/2858930.2858931","relation":{},"subject":[],"published":{"date-parts":[[2016,1,20]]},"assertion":[{"value":"2016-01-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}