1. Agosta, G., Barenghi, A., Maggi, M., Pelosi, G.: Compiler-based side channel vulnerability analysis and optimized countermeasures application. The 51st Annual Design Automation Conference 2014, DAC ’14, San Francisco, CA, USA, June 1–5, 2014. ACM 2014 ISBN 978-1-4503-2730-5. In: DAC, Austin, p. 81. ACM (2013)
2. Agosta, G., Barenghi, A., Pelosi, G.: A Code morphing methodology to automate power analysis countermeasures. The 50th Annual Design Automation Conference 2013, DAC ’13, Austin, TX, USA, May 29–June 07, 2013. ACM 2013 ISBN 978-1-4503-2071-9. In: DAC, Sydney, pp. 77–82 (2012)
3. Barenghi, A., Bertoni, G., Breveglieri, L., Pellicioli, M., Pelosi, G.: Low voltage fault attacks to AES. In: Plusquellic, J., Mai, K. (eds.) HOST, Anaheim, pp. 7–12. IEEE Computer Society (2010)
4. Barenghi, A., Bertoni, G.M., Breveglieri, L., Pellicioli, M., Pelosi, G.: Injection technologies for fault attacks on microprocessors. In: Joye and Tunstall [14], pp. 275–293
5. Barenghi, A., Bertoni, G.M., Breveglieri, L., Pelosi, G.: A fault induction technique based on voltage underfeeding with application to attacks against AES and RSA. J. Syst. Softw. 86(7), 1864–1878 (2013)