Abstract is missing.
- On the Importance of Initial Solutions Selection in Fault InjectionMarina Krcek, Daniele Fronte, Stjepan Picek. 1-12 [doi]
- A High-Order Infective Countermeasure FrameworkGuillaume Barbu, Luk Bettale, Laurent Castelnovi, Thomas Chabrier, Nicolas Debande, Christophe Giraud 0001, Nathan Reboud. 13-19 [doi]
- ARCHIE: A QEMU-Based Framework for Architecture-Independent Evaluation of FaultsFlorian Hauschild, Kathrin Garb, Lukas Auer, Bodo Selmke, Johannes Obermaier. 20-30 [doi]
- EM Fault Model Characterization on SoCs: From Different Architectures to the Same Fault ModelThomas Trouchkine, Guillaume Bouffard, Jessy Clédière. 31-38 [doi]
- Safe-Error Analysis of Post-Quantum Cryptography Mechanisms - Short Paper-Luk Bettale, Simon Montoya, Guénaël Renault. 39-44 [doi]
- Algebraic Fault Analysis of Subterranean 2.0Michael Gruber, Patrick Karl, Georg Sigl. 45-55 [doi]
- Are Cold Boot Attacks Still Feasible: A Case Study on Raspberry Pi With Stacked MemoryYoo-Seung Won, Shivam Bhasin. 56-60 [doi]
- Short Paper: EMFI for Safety-Critical Testing of Automotive SystemsColin O'Flynn. 61-66 [doi]
- On the scaling of EMFI probesJ. Toulemont, G. Chancel, Jean Marc Gallière, Frédérick Mailly, Pascal Nouet, Philippe Maurine. 67-73 [doi]
- Laser Fault Injection in a 32-bit Microcontroller: from the Flash Interface to the Execution PipelineVanthanh Khuat, Jean-Luc Danger, Jean-Max Dutertre. 74-85 [doi]
- The Forgotten Threat of Voltage Glitching: A Case Study on Nvidia Tegra X2 SoCsOtto Bittner, Thilo Krachenfels, Andreas Galauner, Jean-Pierre Seifert. 86-97 [doi]