Combining static analysis and dynamic symbolic execution in a toolchain to detect fault injection vulnerabilities
Crossref DOI link: https://doi.org/10.1007/s13389-023-00310-8
Published Online: 2023-01-18
Published Print: 2024-04
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Lacombe, Guilhem
Feliot, David
Boespflug, Etienne
Potet, Marie-Laure
Funding for this research was provided by:
Université Grenoble Alpes
Text and Data Mining valid from 2023-01-18
Version of Record valid from 2023-01-18
Article History
Received: 27 May 2022
Accepted: 5 January 2023
First Online: 18 January 2023