{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:58:09Z","timestamp":1755838689303},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.23919\/date.2018.8342268","type":"proceedings-article","created":{"date-parts":[[2018,4,23]],"date-time":"2018-04-23T23:20:11Z","timestamp":1524525611000},"page":"1586-1591","source":"Crossref","is-referenced-by-count":9,"title":["Securing conditional branches in the presence of fault attacks"],"prefix":"10.23919","author":[{"given":"Robert","family":"Schilling","sequence":"first","affiliation":[]},{"given":"Mario","family":"Werner","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Mangard","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"SOFIA: software and control flow integrity architecture","author":"de clercq","year":"0","journal-title":"Design Automation & Test in Europe Conference & Exhibition &#x2014; DATE 2016"},{"key":"ref11","article-title":"An-encoding compiler: Building safety-critical systems with commodity hardware","author":"fetzer","year":"0","journal-title":"Computer Safety Reliability and Security &#x2014; SAFECOMP 2009"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.1002\/j.1538-7305.1950.tb00463.x","article-title":"Error detecting and error correcting codes","author":"hamming","year":"1950","journal-title":"Bell Labs Technical Journal"},{"key":"ref13","article-title":"A practitioner's guide to software-based soft-error mitigation using an-codes","author":"hoffmann","year":"0","journal-title":"IEEE International Symposium on High-Assurance Systems Engineering &#x2014; HASE 2014"},{"key":"ref14","article-title":"Fault attacks for CRT based RSA: new attacks, new results, and new countermeasures","author":"kim","year":"0","journal-title":"Information Security Theory and Practice &#x2014; WISTP 2007"},{"key":"ref15","article-title":"A comparative cost\/security analysis of fault attack countermeasures","author":"malkin","year":"0","journal-title":"Fault Diagnosis and Tolerance in Cryptography &#x2014; FDTC 2006"},{"key":"ref16","article-title":"Coding schemes for arithmetic and logic operations &#x2014; how robust are they?","author":"medwed","year":"0","journal-title":"Information Security Applications &#x2014; WISA 2009"},{"journal-title":"Bypassing Secure Boot using Fault Injection","year":"0","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2008.10"},{"journal-title":"Execution integrity with in-place encryption","year":"2017","author":"sullivan","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1873548.1873555"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2009.30"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052259"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2858930.2858931"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.1109\/TEC.1960.5219855","article-title":"Error detecting and correcting binary codes for arithmetic operations","author":"brown","year":"1960","journal-title":"IRE Trans Electronic Computers"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s001450010016"},{"journal-title":"Atmel at02333 Safe and secure bootloader implementation for sam3\/4","year":"0","key":"ref2"},{"key":"ref1","article-title":"Control-flow integrity","author":"abadi","year":"0","journal-title":"Conference on Computer and Communications Security &#x2014; CCS 2005"},{"key":"ref9","article-title":"Differential fault analysis on AES key schedule and some coutnermeasures","author":"chen","year":"0","journal-title":"Information Security and Privacy &#x2014; ACISP 2003"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21040-2_15"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270297"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2011.12"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-31271-2_10"}],"event":{"name":"2018 Design, Automation & Test in Europe Conference & Exhibition (DATE)","start":{"date-parts":[[2018,3,19]]},"location":"Dresden, Germany","end":{"date-parts":[[2018,3,23]]}},"container-title":["2018 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8337149\/8341968\/08342268.pdf?arnumber=8342268","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,5,8]],"date-time":"2018-05-08T18:30:58Z","timestamp":1525804258000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8342268\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3]]},"references-count":23,"URL":"https:\/\/doi.org\/10.23919\/date.2018.8342268","relation":{},"subject":[],"published":{"date-parts":[[2018,3]]}}}