{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,22]],"date-time":"2025-03-22T04:20:06Z","timestamp":1742617206796,"version":"3.40.2"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540617723"},{"type":"electronic","value":"9783540706779"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1996]]},"DOI":"10.1007\/3-540-61772-8_36","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T22:22:48Z","timestamp":1330294968000},"page":"159-177","source":"Crossref","is-referenced-by-count":0,"title":["Compiler assisted self-checking of structural integrity using return address hashing"],"prefix":"10.1007","author":[{"given":"Uwe","family":"Wildner","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,6]]},"reference":[{"key":"10_CR1","unstructured":"A. V. Aho, R. Sethi and J. D. Ullman: \u201cCompilers \u2014 Principles, Techniques, and Tools\u201d, Addison-Wesley, 1986"},{"key":"10_CR2","unstructured":"J. Carreira, H. Madeira, and J. G. Silva: \u201cXception: Software Fault Injection and Monitoring in Processor Functional Units\u201d, 5th Intern. Conference on Dependable Computing for Critical Applications, p. 135\u2013149"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Edward W. Czeck, Daniel P. Siewiorek: \u201cEffects of Transient Gate-Level Faults on Program Behavior\u201d, 20th International Symposium on Fault-Tolerant Computing, p. 236\u2013243","DOI":"10.1109\/FTCS.1990.89371"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Ulf Gunneflo, Johann Karlsson, Jan Torin: \u201cEvaluation of Error Detection Schemes Using Fault Injection by Heavy-Ion Radiation\u201d, 19th International Symposium on Fault-Tolerant Computing, p. 340\u2013347","DOI":"10.1109\/FTCS.1989.105590"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"G. A. Kanawati, N. A. Kanawati, and J. A. Abraham: \u201cFERRARI: A Tool for The Validation of System Dependability Properties\u201d, 22th International Symposium on Fault-Tolerant Computing, p. 336\u2013344","DOI":"10.1109\/FTCS.1992.243567"},{"issue":"1","key":"10_CR6","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1109\/TSE.1975.6312823","volume":"SE 1","author":"J.R. Kane","year":"1975","unstructured":"J.R.Kane and Stephen S.Yau: \u201cConcurrent Software Fault Detection\u201d, IEEE Transactions on Software Engineering SE 1(1): 87\u201399, March 1975","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"7","key":"10_CR7","doi-asserted-by":"crossref","first-page":"681","DOI":"10.1109\/TC.1982.1676066","volume":"C-31","author":"D. J. Lu","year":"1982","unstructured":"David Jun Lu: \u201cWatchdog Processors and Structural Integrity Checking\u201d, IEEE Transactions on Computers, C-31(7): 681\u2013685, July 1982","journal-title":"IEEE Transactions on Computers"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"E. Michel and W. Hohl: \u201cConcurrent Error Detection Using Watchdog Processors in the Multiprocssor System MEMSY\u201d, Fault Tolerant Computing Systems. Informatik Fachberichte 283, p. 54\u201364","DOI":"10.1007\/978-3-642-76930-6_5"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"G. Miremadi, J. Karlsson, U. Gunneflo, and J. Torin: \u201cTwo Software Techniques for On-line Error Detection\u201d, 22th International Symposium on Fault-Tolerant Computing, p. 328\u2013335","DOI":"10.1109\/FTCS.1992.243568"},{"issue":"2","key":"10_CR10","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1109\/12.2145","volume":"C-37","author":"A. Mahmood","year":"1988","unstructured":"Aamer Mahmood and E.J. McCluskey: \u201cConcurrent Error Detection Using Watchdog Processors \u2014 A Survey\u201d, IEEE Transactions on Computers, C-37(2): 160\u2013174, February 1988","journal-title":"IEEE Transactions on Computers"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Ghassem Miremadi and Jan Torin: \u201cEffects of Physical Injection of Transient Faults on Control Flow and Evaluation of Some Software-Implemented Error Detection Techniques\u201d, 4th International Conference on Dependable Computing for Critical Applications, p. 435\u2013457","DOI":"10.1007\/978-3-7091-9396-9_36"},{"key":"10_CR12","unstructured":"M. Namjoo: \u201cTechniques for Concurrent Testing of VLSI Processor Operation\u201d, 1982 International Test Conference, p.461\u2013468"},{"key":"10_CR13","unstructured":"Volkmar Sieh and Joachim H\u00f6nig: \u201cSoftware Based Concurrent Control Flow Checking\u201d, Internal Report 10\/95, IMMD III, University of Erlangen-N\u00fcrnberg, Dec.1995"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Nirmal R. Saxena and Ed. J. McCluskey: \u201cControl-Flow Checking Using Watchdog assists and extended-precision checksums\u201d, 19th International Symposium on Fault-Tolerant Computing, p. 428\u2013435","DOI":"10.1109\/FTCS.1989.105615"},{"key":"10_CR15","unstructured":"Michael A. Schuette and John P. Shen: \u201cOn-line self monitoring using signatured instruction streams\u201d, 13th International Test Conference, p. 275\u2013282"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Michael A. Schuette and John P. Shen: \u201cExploiting Instruction-level Resource Parallelism for Transparent, Integrated Control-Flow Monitoring\u201d, 21th International Symposium on Fault-Tolerant Computing, p. 318\u2013325","DOI":"10.1109\/FTCS.1991.146680"},{"key":"10_CR17","unstructured":"M.A. Schuette, J.P. Shen, D.P. Siewiorek and Y.X. Zhu: \u201cExperimental Evaluation of Two Concurrent Error Detection Schemes\u201d, 16th International Symposium on Fault-Tolerant Computing, p. 138\u2013143"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Nancy J. Warter and Wen-Mei W. Hwu: \u201cA Software Based Approach to Achieving Optimal Performance for Signature Control Flow Checking\u201d, 20th International Symposium on Fault-Tolerant Computing, p. 442\u2013449","DOI":"10.1109\/FTCS.1990.89399"},{"issue":"11","key":"10_CR19","doi-asserted-by":"crossref","first-page":"1372","DOI":"10.1109\/12.247847","volume":"C-42","author":"K. D. Wilken","year":"1993","unstructured":"Kent D. Wilken: \u201cAn Optimal Graph-Construction Approach to Placing Program Signatures for Signature Monitoring\u201d, IEEE Transactions on Computers, C-42(11): 1372\u20131380, November 1993","journal-title":"IEEE Transactions on Computers"},{"key":"10_CR20","unstructured":"Uwe Wildner: \u201cSoftware Implemented Control Flow Error Injection\u201d Tech. Report MPI-96-601, Max-Planck-Working Group on Fault Tolerant Computing, Jan. 1996, http:\/\/www.mpag-inf.uni-potsdam.de\/reports\/MPI-I-96-601.ps.gz"},{"issue":"6","key":"10_CR21","doi-asserted-by":"crossref","first-page":"629","DOI":"10.1109\/43.55193","volume":"9","author":"K. Wilken","year":"1990","unstructured":"Kent Wilken and John Paul Shen: \u201cContinuous Signature Monitoring: Low-Cost Concurrent Detection of Processor Control Errors\u201d, IEEE Transactions on Computer-Aided Design of Integrated Circuits, 9(6):629\u2013641, June 1990","journal-title":"IEEE Transactions on Computer-Aided Design of Integrated Circuits"},{"key":"10_CR22","unstructured":"Stephen. S. Yau an R. C. Cheung: \u201cDesign of Self-Checking Software\u201d, International Conference on Reliable Software, March 1975"},{"issue":"2","key":"10_CR23","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1109\/TSE.1980.234478","volume":"SE 6","author":"S. S. Yau","year":"1980","unstructured":"Stephen S. Yau and Fu-Chung Chen: \u201cAn Approach to Concurrent Control Flow Checking\u201d, IEEE Transactions on Software Engineering SE 6(2): 126\u2013137, March 1980","journal-title":"IEEE Transactions on Software Engineering"}],"container-title":["Lecture Notes in Computer Science","Dependable Computing \u2014 EDCC-2"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-61772-8_36.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,21]],"date-time":"2025-03-21T23:25:56Z","timestamp":1742599556000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-61772-8_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996]]},"ISBN":["9783540617723","9783540706779"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/3-540-61772-8_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1996]]}}}