1. Abadi, M., Budiu, M., Erlingsson, U., Ligatti, J.: Control-flow integrity. In: Atluri, V., Meadows, C., Juels, A. (eds.) 12th ACM Conference on Computer and Communications Security, pp. 340–353. ACM Press, Alexandria (2005)
2. Balasch, J., Gierlichs, B., Verbauwhede, I.: An in-depth and black-box characterization of the effects of clock glitches on 8-bit MCUs. In: Breveglieri, L., Guilley, S., Koren, I., Naccache, D., Takahashi, J. (eds.) The 8th Workshop on Fault Diagnosis and Tolerance in Cryptography, pp. 105–114. IEEE Computer Society Press, Nara (2011)
3. Lecture Notes in Computer Science;G. Barbu,2011
4. Lecture Notes in Computer Science;G. Barbu,2010
5. Barenghi, A., Breveglieri, L., Koren, I., Naccache, D.: Fault Injection Attacks on Cryptographic Devices: Theory, Practice, and Countermeasures. Proceedings of the IEEE 100(11), 3056–3076 (2012)