{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T13:31:35Z","timestamp":1772890295597,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,15]],"date-time":"2019-11-15T00:00:00Z","timestamp":1573776000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"ANR","award":["ANR-10-AIRT- 05"],"award-info":[{"award-number":["ANR-10-AIRT- 05"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,15]]},"DOI":"10.1145\/3338503.3357724","type":"proceedings-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T19:43:22Z","timestamp":1573155802000},"page":"65-76","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Detecting Fault Injection Attacks with Runtime Verification"],"prefix":"10.1145","author":[{"given":"Ali","family":"Kassem","sequence":"first","affiliation":[{"name":"Univ.\u00a0Grenoble\u00a0Alpes, Inria, CNRS,\u00a0Grenoble\u00a0INP, LIG, Grenoble, France"}]},{"given":"Yli\u00e8s","family":"Falcone","sequence":"additional","affiliation":[{"name":"Univ.\u00a0Grenoble\u00a0Alpes, Inria, CNRS,\u00a0Grenoble\u00a0INP, LIG, Grenoble, France"}]}],"member":"320","published-online":{"date-parts":[[2019,11,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609960"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the 13th Annual IEEE\/ACM International Symposium on Code Generation and Optimization, CGO 2015","author":"Arthur William","year":"2015","unstructured":"William Arthur , Ben Mehne , Reetuparna Das , and Todd M. Austin . 2015. Getting in control of your control flow with control-data isolation . In Proceedings of the 13th Annual IEEE\/ACM International Symposium on Code Generation and Optimization, CGO 2015 , San Francisco, CA, USA , February 07-11, 2015 ,, Kunle Olukotun, Aaron Smith, Robert Hundt, and Jason Mars (Eds.). IEEE Computer Society, 79--90. https:\/\/doi.org\/10.1109\/CGO.2015.7054189 10.1109\/CGO.2015.7054189 William Arthur, Ben Mehne, Reetuparna Das, and Todd M. Austin. 2015. Getting in control of your control flow with control-data isolation. In Proceedings of the 13th Annual IEEE\/ACM International Symposium on Code Generation and Optimization, CGO 2015, San Francisco, CA, USA, February 07-11, 2015,, Kunle Olukotun, Aaron Smith, Robert Hundt, and Jason Mars (Eds.). IEEE Computer Society, 79--90. https:\/\/doi.org\/10.1109\/CGO.2015.7054189"},{"key":"e_1_3_2_1_3_1","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"Christian Aum\u00fc","year":"2002","unstructured":"Christian Aum\u00fc ller, Peter Bier , Wieland Fischer , Peter Hofreiter , and Jean-Pierre Seifert . 2002 . Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures . In Cryptographic Hardware and Embedded Systems - CHES 2002 , Redwood Shores, USA , 2002, Revised Papers. 260--275. Christian Aum\u00fc ller, Peter Bier, Wieland Fischer, Peter Hofreiter, and Jean-Pierre Seifert. 2002. Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures. In Cryptographic Hardware and Embedded Systems - CHES 2002, Redwood Shores, USA, 2002, Revised Papers. 260--275."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2011.9"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.862424"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1873548.1873555"},{"key":"e_1_3_2_1_7_1","volume-title":"Klaus Havelund, Giles Reger, and David E. Rydeheard.","author":"Barringer Howard","year":"2012","unstructured":"Howard Barringer , Yli\u00e8 s Falcone , Klaus Havelund, Giles Reger, and David E. Rydeheard. 2012 . Quantified Event Automata: Towards Expressive and Efficient Runtime Monitors. In FM 2012: Formal Methods - 18th International Symposium, Paris, France, August 27--31, 2012. Proceedings (Lecture Notes in Computer Science),, Dimitra Giannakopoulou and Dominique M\u00e9 ry (Eds.), Vol. 7436 . Springer , 68--84. https:\/\/doi.org\/10.1007\/978-3-642-32759-9_9 10.1007\/978-3-642-32759-9_9 Howard Barringer, Yli\u00e8 s Falcone, Klaus Havelund, Giles Reger, and David E. Rydeheard. 2012. Quantified Event Automata: Towards Expressive and Efficient Runtime Monitors. In FM 2012: Formal Methods - 18th International Symposium, Paris, France, August 27--31, 2012. Proceedings (Lecture Notes in Computer Science),, Dimitra Giannakopoulou and Dominique M\u00e9 ry (Eds.), Vol. 7436. Springer, 68--84. https:\/\/doi.org\/10.1007\/978-3-642-32759-9_9"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858930.2858931"},{"key":"e_1_3_2_1_9_1","volume-title":"First international Competition on Runtime Verification: rules, benchmarks, tools, and final results of CRV","author":"Bartocci Ezio","year":"2014","unstructured":"Ezio Bartocci , Yli\u00e8s Falcone , Borzoo Bonakdarpour , Christian Colombo , Normann Decker , Klaus Havelund , Yogi Joshi , Felix Klaedtke , Reed Milewicz , Giles Reger , Grigore Rosu , Julien Signoles , Daniel Thoma , Eugen Zalinescu , and Yi Zhang . 2017. First international Competition on Runtime Verification: rules, benchmarks, tools, and final results of CRV 2014 . International Journal on Software Tools for Technology Transfer ( 2017), 1--40. https:\/\/doi.org\/10.1007\/s10009-017-0454--5 10.1007\/s10009-017-0454--5 Ezio Bartocci, Yli\u00e8s Falcone, Borzoo Bonakdarpour, Christian Colombo, Normann Decker, Klaus Havelund, Yogi Joshi, Felix Klaedtke, Reed Milewicz, Giles Reger, Grigore Rosu, Julien Signoles, Daniel Thoma, Eugen Zalinescu, and Yi Zhang. 2017. First international Competition on Runtime Verification: rules, benchmarks, tools, and final results of CRV 2014. International Journal on Software Tools for Technology Transfer (2017), 1--40. https:\/\/doi.org\/10.1007\/s10009-017-0454--5"},{"key":"e_1_3_2_1_10_1","volume-title":"Adrian Francalanza, and Giles Reger.","author":"Bartocci Ezio","year":"2018","unstructured":"Ezio Bartocci , Yli\u00e8 s Falcone , Adrian Francalanza, and Giles Reger. 2018 . Introduction to Runtime Verification. In Lectures on Runtime Verification - Introductory and Advanced Topics . Ezio Bartocci, Yli\u00e8 s Falcone, Adrian Francalanza, and Giles Reger. 2018. Introduction to Runtime Verification. In Lectures on Runtime Verification - Introductory and Advanced Topics."},{"key":"e_1_3_2_1_11_1","volume-title":"Scalable Offline Monitoring. In Runtime Verification: 5th International Conference, RV 2014. Proceedings, Borzoo Bonakdarpour and Scott A. Smolka (Eds.). Springer International Publishing, 31--47","author":"Basin David","year":"2014","unstructured":"David Basin , Germano Caronni , Sarah Ereth , Mat\u00favs Harvan , Felix Klaedtke , and Heiko Mantel . 2014 . Scalable Offline Monitoring. In Runtime Verification: 5th International Conference, RV 2014. Proceedings, Borzoo Bonakdarpour and Scott A. Smolka (Eds.). Springer International Publishing, 31--47 . https:\/\/doi.org\/10.1007\/978-3-319-11164-3_4 10.1007\/978-3-319-11164-3_4 David Basin, Germano Caronni, Sarah Ereth, Mat\u00favs Harvan, Felix Klaedtke, and Heiko Mantel. 2014. Scalable Offline Monitoring. In Runtime Verification: 5th International Conference, RV 2014. Proceedings, Borzoo Bonakdarpour and Scott A. Smolka (Eds.). Springer International Publishing, 31--47. https:\/\/doi.org\/10.1007\/978-3-319-11164-3_4"},{"key":"e_1_3_2_1_12_1","volume-title":"Fault Cryptanalysis of CHES 2014 Symmetric Infective Countermeasure. IACR Cryptology ePrint Archive","volume":"2015","author":"Battistello Alberto","year":"2015","unstructured":"Alberto Battistello and Christophe Giraud . 2015 . Fault Cryptanalysis of CHES 2014 Symmetric Infective Countermeasure. IACR Cryptology ePrint Archive , Vol. 2015 (2015), 500. http:\/\/eprint.iacr.org\/2015\/500 Alberto Battistello and Christophe Giraud. 2015. Fault Cryptanalysis of CHES 2014 Symmetric Infective Countermeasure. IACR Cryptology ePrint Archive, Vol. 2015 (2015), 500. http:\/\/eprint.iacr.org\/2015\/500"},{"key":"e_1_3_2_1_13_1","volume-title":"High Level Model of Control Flow Attacks for Smart Card Functional Security. In ARES 2012","author":"Berthom\u00e9 Pascal","year":"2012","unstructured":"Pascal Berthom\u00e9 , Karine Heydemann , Xavier Kauffmann-Tourkestansky , and Jean-Francc ois Lalande . 2012 . High Level Model of Control Flow Attacks for Smart Card Functional Security. In ARES 2012 , Czech Republic , 2012. Pascal Berthom\u00e9, Karine Heydemann, Xavier Kauffmann-Tourkestansky, and Jean-Francc ois Lalande. 2012. High Level Model of Control Flow Attacks for Smart Card Functional Security. In ARES 2012, Czech Republic, 2012."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076783"},{"key":"e_1_3_2_1_15_1","volume-title":"Advances in Cryptology - EUROCRYPT '97, International Conference on the Theory and Application of Cryptographic Techniques","author":"Boneh Dan","year":"1997","unstructured":"Dan Boneh , Richard A. DeMillo , and Richard J. Lipton . 1997. On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract) . In Advances in Cryptology - EUROCRYPT '97, International Conference on the Theory and Application of Cryptographic Techniques , Konstanz, Germany , 1997 , Proceeding. Dan Boneh, Richard A. DeMillo, and Richard J. Lipton. 1997. On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract). In Advances in Cryptology - EUROCRYPT '97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, 1997, Proceeding."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s001450010016"},{"key":"e_1_3_2_1_17_1","volume-title":"Detecting Laser Fault Injection for Smart Cards Using Security Automata. In SSCC 2013, India, 2013. Proceedings.","author":"Bouffard Guillaume","year":"2013","unstructured":"Guillaume Bouffard , Bhagyalekshmy N. Thampi , and Jean-Louis Lanet . 2013 . Detecting Laser Fault Injection for Smart Cards Using Security Automata. In SSCC 2013, India, 2013. Proceedings. Guillaume Bouffard, Bhagyalekshmy N. Thampi, and Jean-Louis Lanet. 2013. Detecting Laser Fault Injection for Smart Cards Using Security Automata. In SSCC 2013, India, 2013. Proceedings."},{"key":"e_1_3_2_1_18_1","volume-title":"IN PROC. FDTC'05","author":"Ciet Mathieu","year":"2005","unstructured":"Mathieu Ciet and Marc Joye . 2005 . Practical Fault Countermeasures for Chinese Remaindering Based RSA (Extended Abstract) . In IN PROC. FDTC'05 . 124--131. Mathieu Ciet and Marc Joye. 2005. Practical Fault Countermeasures for Chinese Remaindering Based RSA (Extended Abstract). In IN PROC. FDTC'05. 124--131."},{"key":"e_1_3_2_1_19_1","volume-title":"Runtime Verification: Third International Conference, RV 2012","author":"Colombo Christian","year":"2012","unstructured":"Christian Colombo and Gordon J. Pace . 2013. Fast-Forward Runtime Monitoring -- An Industrial Case Study . In Runtime Verification: Third International Conference, RV 2012 , Istanbul, Turkey , September 25-28, 2012 , Revised Selected Papers, Shaz Qadeer and Serdar Tasiran (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 214--228. https:\/\/doi.org\/10.1007\/978-3-642-35632-2_22 10.1007\/978-3-642-35632-2_22 Christian Colombo and Gordon J. Pace. 2013. Fast-Forward Runtime Monitoring -- An Industrial Case Study. In Runtime Verification: Third International Conference, RV 2012, Istanbul, Turkey, September 25-28, 2012, Revised Selected Papers, Shaz Qadeer and Serdar Tasiran (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 214--228. https:\/\/doi.org\/10.1007\/978-3-642-35632-2_22"},{"key":"e_1_3_2_1_20_1","volume-title":"Electromagnetic Glitch on the AES Round Counter. In COSADE'13","author":"Dehbaoui Amine","year":"2013","unstructured":"Amine Dehbaoui , Amir-Pasha Mirbaha , Nicolas Moro , Jean-Max Dutertre , and Assia Tria . 2013 . Electromagnetic Glitch on the AES Round Counter. In COSADE'13 , Revised Selected Papers. 17--31. Amine Dehbaoui, Amir-Pasha Mirbaha, Nicolas Moro, Jean-Max Dutertre, and Assia Tria. 2013. Electromagnetic Glitch on the AES Round Counter. In COSADE'13, Revised Selected Papers. 17--31."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45477-1_1"},{"key":"e_1_3_2_1_22_1","volume-title":"RV 2018, Limassol, Cyprus, November 10-13, 2018, Proceedings (Lecture Notes in Computer Science),, Christian Colombo and Martin Leucker (Eds.)","volume":"11237","author":"El-Hokayem Antoine","year":"2018","unstructured":"Antoine El-Hokayem and Yli\u00e8 s Falcone . 2018 . Bringing Runtime Verification Home. In Runtime Verification - 18th International Conference , RV 2018, Limassol, Cyprus, November 10-13, 2018, Proceedings (Lecture Notes in Computer Science),, Christian Colombo and Martin Leucker (Eds.) , Vol. 11237 . Springer, 222--240. https:\/\/doi.org\/10.1007\/978--3-030-03769--7_13 10.1007\/978--3-030-03769--7_13 Antoine El-Hokayem and Yli\u00e8 s Falcone. 2018. Bringing Runtime Verification Home. In Runtime Verification - 18th International Conference, RV 2018, Limassol, Cyprus, November 10-13, 2018, Proceedings (Lecture Notes in Computer Science),, Christian Colombo and Martin Leucker (Eds.), Vol. 11237. Springer, 222--240. https:\/\/doi.org\/10.1007\/978--3-030-03769--7_13"},{"key":"e_1_3_2_1_23_1","volume-title":"COSADE 2014","author":"Endo Sho","year":"2014","unstructured":"Sho Endo , Naofumi Homma , Yu-ichi Hayashi, Junko Takahashi , Hitoshi Fuji , and Takafumi Aoki . 2014 . A Multiple-Fault Injection Attack by Adaptive Timing Control Under Black-Box Conditions and a Countermeasure. In Constructive Side-Channel Analysis and Secure Design - 5th International Workshop , COSADE 2014 , Paris, France , April 13-15, 2014. Revised Selected Papers. 214--228. Sho Endo, Naofumi Homma, Yu-ichi Hayashi, Junko Takahashi, Hitoshi Fuji, and Takafumi Aoki. 2014. A Multiple-Fault Injection Attack by Adaptive Timing Control Under Black-Box Conditions and a Countermeasure. In Constructive Side-Channel Analysis and Secure Design - 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers. 214--228."},{"key":"e_1_3_2_1_25_1","volume-title":"Runtime Verification - First International Conference, RV","author":"Falcone Yli\u00e8","year":"2010","unstructured":"Yli\u00e8 s Falcone . 2010. You Should Better Enforce Than Verify . In Runtime Verification - First International Conference, RV 2010 . Proceedings (Lecture Notes in Computer Science), Howard Barringer, Yli\u00e8 s Falcone, Bernd Finkbeiner, Klaus Havelund, Insup Lee, Gordon J. Pace, Grigore Rosu, Oleg Sokolsky, and Nikolai Tillmann (Eds.), Vol. 6418 . Springer , 89--105. https:\/\/doi.org\/10.1007\/978-3-642-16612-9_9 10.1007\/978-3-642-16612-9_9 Yli\u00e8 s Falcone. 2010. You Should Better Enforce Than Verify. In Runtime Verification - First International Conference, RV 2010. Proceedings (Lecture Notes in Computer Science), Howard Barringer, Yli\u00e8 s Falcone, Bernd Finkbeiner, Klaus Havelund, Insup Lee, Gordon J. Pace, Grigore Rosu, Oleg Sokolsky, and Nikolai Tillmann (Eds.), Vol. 6418. Springer, 89--105. https:\/\/doi.org\/10.1007\/978-3-642-16612-9_9"},{"key":"e_1_3_2_1_26_1","unstructured":"Yli\u00e8 s Falcone Klaus Havelund and Giles Reger. 2013. A Tutorial on Runtime Verification. In Engineering Dependable Software Systems. 141--175.  Yli\u00e8 s Falcone Klaus Havelund and Giles Reger. 2013. A Tutorial on Runtime Verification. In Engineering Dependable Software Systems. 141--175."},{"key":"e_1_3_2_1_27_1","series-title":"Lecture Notes in Computer Science","volume-title":"Lectures on Runtime Verification - Introductory and Advanced Topics, Ezio Bartocci and Yli\u00e8 s Falcone (Eds.)","author":"Falcone Yli\u00e8","unstructured":"Yli\u00e8 s Falcone , Leonardo Mariani , Antoine Rollet , and Saikat Saha . 2018. Runtime Failure Prevention and Reaction . In Lectures on Runtime Verification - Introductory and Advanced Topics, Ezio Bartocci and Yli\u00e8 s Falcone (Eds.) . Lecture Notes in Computer Science , Vol. 10457 . Springer , 103--134. https:\/\/doi.org\/10.1007\/978-3-319-75632-5_4 10.1007\/978-3-319-75632-5_4 Yli\u00e8 s Falcone, Leonardo Mariani, Antoine Rollet, and Saikat Saha. 2018. Runtime Failure Prevention and Reaction. In Lectures on Runtime Verification - Introductory and Advanced Topics, Ezio Bartocci and Yli\u00e8 s Falcone (Eds.). Lecture Notes in Computer Science, Vol. 10457. Springer, 103--134. https:\/\/doi.org\/10.1007\/978-3-319-75632-5_4"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10703-011-0114-4"},{"key":"e_1_3_2_1_29_1","volume-title":"PICON: Control Flow Integrity on LLVM IR. SSTIC","author":"Fontaine Arnaud","year":"2015","unstructured":"Arnaud Fontaine , Pierre Chifflier , and Thomas Coudray . 2015 . PICON: Control Flow Integrity on LLVM IR. SSTIC (2015). Arnaud Fontaine, Pierre Chifflier, and Thomas Coudray. 2015. PICON: Control Flow Integrity on LLVM IR. SSTIC (2015)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2009.29"},{"key":"e_1_3_2_1_31_1","volume-title":"Verified Software: Theories, Tools, Experiments, First IFIP TC 2\/WG 2.3 Conference, VSTTE","author":"Havelund Klaus","year":"2005","unstructured":"Klaus Havelund and Allen Goldberg . 2005. Verify Your Runs . In Verified Software: Theories, Tools, Experiments, First IFIP TC 2\/WG 2.3 Conference, VSTTE 2005 , Zurich, Switzerland, October 10--13, 2005, Revised Selected Papers and Discussions (Lecture Notes in Computer Science),, Bertrand Meyer and Jim Woodcock (Eds.), Vol. 4171 . Springer , 374--383. https:\/\/doi.org\/10.1007\/978-3-540-69149-5_40 10.1007\/978-3-540-69149-5_40 Klaus Havelund and Allen Goldberg. 2005. Verify Your Runs. In Verified Software: Theories, Tools, Experiments, First IFIP TC 2\/WG 2.3 Conference, VSTTE 2005, Zurich, Switzerland, October 10--13, 2005, Revised Selected Papers and Discussions (Lecture Notes in Computer Science),, Bertrand Meyer and Jim Woodcock (Eds.), Vol. 4171. Springer, 374--383. https:\/\/doi.org\/10.1007\/978-3-540-69149-5_40"},{"key":"e_1_3_2_1_32_1","volume-title":"Robshaw","author":"Kaliski Burton S.","year":"1997","unstructured":"Burton S. Kaliski Jr . and Matthew J. B . Robshaw . 1997 . Comments on some new attacks on cryptographic devices. RSA Laboratories Bulletin 5 (July 1997). Burton S. Kaliski Jr. and Matthew J. B. Robshaw. 1997. Comments on some new attacks on cryptographic devices. RSA Laboratories Bulletin 5 (July 1997)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2012.2231707"},{"key":"e_1_3_2_1_34_1","volume-title":"Parity-Based Concurrent Error Detection of Substitution-Permutation Network Block Ciphers. In CHES'03","author":"Karri Ramesh","year":"2003","unstructured":"Ramesh Karri , Grigori Kuznetsov , and Michael G\u00f6 ssel. 2003 . Parity-Based Concurrent Error Detection of Substitution-Permutation Network Block Ciphers. In CHES'03 , Proceedings. Ramesh Karri, Grigori Kuznetsov, and Michael G\u00f6 ssel. 2003. Parity-Based Concurrent Error Detection of Substitution-Permutation Network Block Ciphers. In CHES'03, Proceedings."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10703-017-0280-0"},{"key":"e_1_3_2_1_36_1","unstructured":"Eugene Kuleshov. 2007. Using the ASM framework to implement common Java bytecode transformation patterns.  Eugene Kuleshov. 2007. Using the ASM framework to implement common Java bytecode transformation patterns."},{"key":"e_1_3_2_1_37_1","volume-title":"CARDIS 2018","author":"Kumar Dilip S. V.","year":"2018","unstructured":"Dilip S. V. Kumar , Arthur Beckers , Josep Balasch , Benedikt Gierlichs , and Ingrid Verbauwhede . 2018 . An In-Depth and Black-Box Characterization of the Effects of Laser Pulses on ATmega328P . In CARDIS 2018 , France , 2018, Revised Selected Papers. Dilip S. V. Kumar, Arthur Beckers, Josep Balasch, Benedikt Gierlichs, and Ingrid Verbauwhede. 2018. An In-Depth and Black-Box Characterization of the Effects of Laser Pulses on ATmega328P. In CARDIS 2018, France, 2018, Revised Selected Papers."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11212-1_12"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlap.2008.08.004"},{"key":"e_1_3_2_1_40_1","unstructured":"Tim Lindholm Frank Yellin Gilad Bracha and Alex Buckley. 2013. The Java Virtual Machine Specification Java SE 7 Edition.  Tim Lindholm Frank Yellin Gilad Bracha and Alex Buckley. 2013. The Java Virtual Machine Specification Java SE 7 Edition."},{"key":"e_1_3_2_1_41_1","unstructured":"Davia J. Lu. 1980. Watchdog Processors and VLSI.  Davia J. Lu. 1980. Watchdog Processors and VLSI."},{"key":"e_1_3_2_1_42_1","volume-title":"Proceedings International Test Conference 1985","author":"Mahmood Aamer","year":"1985","unstructured":"Aamer Mahmood , Edward J. McCluskey , and Aydin Ersoz . 1985 . Concurrent System-Level Error Detection Using a Watchdog Processor . In Proceedings International Test Conference 1985 , Philadelphia, PA, USA , November 1985. 145--152. Aamer Mahmood, Edward J. McCluskey, and Aydin Ersoz. 1985. Concurrent System-Level Error Detection Using a Watchdog Processor. In Proceedings International Test Conference 1985, Philadelphia, PA, USA, November 1985. 145--152."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2647508.2647516"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-014-0077-7"},{"key":"e_1_3_2_1_45_1","volume-title":"SIED: Software Implemented Error Detection. In DFT 2003, USA, Proceedings.","author":"Nicolescu Bogdan","year":"2003","unstructured":"Bogdan Nicolescu , Yvon Savaria , and Raoul Velazco . 2003 . SIED: Software Implemented Error Detection. In DFT 2003, USA, Proceedings. Bogdan Nicolescu, Yvon Savaria, and Raoul Velazco. 2003. SIED: Software Implemented Error Detection. In DFT 2003, USA, Proceedings."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNS.2004.839110"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-017-0006-1"},{"key":"e_1_3_2_1_48_1","volume-title":"DIMVA 2015, Milan, Italy, July 9--10, 2015, Proceedings (Lecture Notes in Computer Science), Magnus Almgren, Vincenzo Gulisano, and Federico Maggi (Eds.)","volume":"9148","author":"Payer Mathias","year":"2055","unstructured":"Mathias Payer , Antonio Barresi , and Thomas R. Gross . 2015. Fine-Grained Control-Flow Integrity Through Binary Hardening. In Detection of Intrusions and Malware, and Vulnerability Assessment - 12th International Conference , DIMVA 2015, Milan, Italy, July 9--10, 2015, Proceedings (Lecture Notes in Computer Science), Magnus Almgren, Vincenzo Gulisano, and Federico Maggi (Eds.) , Vol. 9148 . Springer, 144--164. https:\/\/doi.org\/10.1007\/978-3-319- 2055 0-2_8 10.1007\/978-3-319-20550-2_8 Mathias Payer, Antonio Barresi, and Thomas R. Gross. 2015. Fine-Grained Control-Flow Integrity Through Binary Hardening. In Detection of Intrusions and Malware, and Vulnerability Assessment - 12th International Conference, DIMVA 2015, Milan, Italy, July 9--10, 2015, Proceedings (Lecture Notes in Computer Science), Magnus Almgren, Vincenzo Gulisano, and Federico Maggi (Eds.), Vol. 9148. Springer, 144--164. https:\/\/doi.org\/10.1007\/978-3-319-20550-2_8"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.54849"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2008.10"},{"key":"e_1_3_2_1_51_1","unstructured":"Ahmadou Al Khary S\u00e9r\u00e9 Julien Iguchi-Cartigny and Jean-Louis Lanet. 2011. Evaluation of Countermeasures Against Fault Attacks on Smart Cards.  Ahmadou Al Khary S\u00e9r\u00e9 Julien Iguchi-Cartigny and Jean-Louis Lanet. 2011. Evaluation of Countermeasures Against Fault Attacks on Smart Cards."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-018-0038-1"}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","location":"London United Kingdom","acronym":"CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 3rd ACM Workshop on Software Protection"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338503.3357724","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3338503.3357724","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:12:49Z","timestamp":1750201969000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338503.3357724"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,15]]},"references-count":52,"alternative-id":["10.1145\/3338503.3357724","10.1145\/3338503"],"URL":"https:\/\/doi.org\/10.1145\/3338503.3357724","relation":{},"subject":[],"published":{"date-parts":[[2019,11,15]]},"assertion":[{"value":"2019-11-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}