Brief Announcement: Effectiveness of Code Hardening for Fault-Tolerant IoT Software
暂无分享,去创建一个
[1] Karine Heydemann,et al. Software Countermeasures for Control Flow Integrity of Smart Card C Codes , 2014, ESORICS.
[2] Axel Legay,et al. An automated and scalable formal process for detecting fault injection vulnerabilities in binaries , 2019, Concurr. Comput. Pract. Exp..
[3] Karine Heydemann,et al. Formally verified software countermeasures for control-flow integrity of smart card C code , 2019, Comput. Secur..
[4] Axel Legay,et al. Formalising fault injection and countermeasures , 2020, ARES.
[5] Nahid Farhady Ghalaty,et al. Differential Fault Intensity Analysis on PRESENT and LED Block Ciphers , 2015, COSADE.
[6] R. Velazco,et al. Experimentally evaluating an automatic approach for generating safety-critical software with respect to transient errors , 2000 .
[7] Axel Legay,et al. The State of Fault Injection Vulnerability Detection , 2018, VECoS.
[8] Axel Legay,et al. Combined software and hardware fault injection vulnerability detection , 2020, Innovations in Systems and Software Engineering.
[9] Guillaume Barbu,et al. Dynamic Fault Injection Countermeasure - A New Conception of Java Card Security , 2012, CARDIS.
[10] Andrey Bogdanov,et al. PRESENT: An Ultra-Lightweight Block Cipher , 2007, CHES.
[11] David Naccache,et al. The Sorcerer's Apprentice Guide to Fault Attacks , 2006, Proceedings of the IEEE.