{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T21:16:34Z","timestamp":1760044594290,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030873479"},{"type":"electronic","value":"9783030873486"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-87348-6_6","type":"book-chapter","created":{"date-parts":[[2021,10,17]],"date-time":"2021-10-17T18:08:32Z","timestamp":1634494112000},"page":"108-126","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Hardware-Assisted Online Data Race Detection"],"prefix":"10.1007","author":[{"given":"Faustin","family":"Ahishakiye","sequence":"first","affiliation":[]},{"given":"Jos\u00e9 Ignacio Requeno","family":"Jarabo","sequence":"additional","affiliation":[]},{"given":"Violet Ka I","family":"Pun","sequence":"additional","affiliation":[]},{"given":"Volker","family":"Stolz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,17]]},"reference":[{"key":"6_CR1","doi-asserted-by":"publisher","unstructured":"Ahishakiye, F., Jarabo, J.I.R., Pun, K.I., Stolz, V.: Open data for banker example, December 2020. https:\/\/doi.org\/10.5281\/zenodo.4381982","DOI":"10.5281\/zenodo.4381982"},{"key":"6_CR2","unstructured":"Ahishakiye, F., Jarabo, J.I.R., Stolz, V.: Lock instrumentation tool (2020). https:\/\/github.com\/selabhvl\/coems-racechecker"},{"key":"6_CR3","doi-asserted-by":"publisher","unstructured":"Artho, C., Havelund, K., Biere, A.: High-level data races. Softw. Test. Verif. Reliab. 13(4), 207\u2013227 (2003). https:\/\/doi.org\/10.1002\/stvr.281","DOI":"10.1002\/stvr.281"},{"key":"6_CR4","doi-asserted-by":"publisher","unstructured":"Baumeister, J., Finkbeiner, B., Schwenger, M., Torfah, H.: FPGA stream-monitoring of real-time properties. ACM Trans. Embed. Comput. Syst. 18(5s) (2019). https:\/\/doi.org\/10.1145\/3358220","DOI":"10.1145\/3358220"},{"issue":"2","key":"6_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2024716.2024718","volume":"39","author":"N Binkert","year":"2011","unstructured":"Binkert, N., et al.: The Gem5 simulator. SIGARCH Comput. Archit. News 39(2), 1\u20137 (2011). https:\/\/doi.org\/10.1145\/2024716.2024718","journal-title":"SIGARCH Comput. Archit. News"},{"issue":"4","key":"6_CR6","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1109\/TSE.2010.25","volume":"36","author":"E Bodden","year":"2010","unstructured":"Bodden, E., Havelund, K.: Aspect-oriented race detection in Java. IEEE Trans. Software Eng. 36(4), 509\u2013527 (2010). https:\/\/doi.org\/10.1109\/TSE.2010.25","journal-title":"IEEE Trans. Software Eng."},{"key":"6_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/978-3-030-03769-7_5","volume-title":"Runtime Verification","author":"L Convent","year":"2018","unstructured":"Convent, L., Hungerecker, S., Scheffel, T., Schmitz, M., Thoma, D., Weiss, A.: Hardware-based runtime verification with embedded tracing units and stream processing. In: Colombo, C., Leucker, M. (eds.) RV 2018. LNCS, vol. 11237, pp. 43\u201363. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03769-7_5"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Decker, N., et al.: Online analysis of debug trace data for embedded systems. In: Madsen, J., Coskun, A.K. (eds.) Design, Automation & Test in Europe Conference & Exhibition, DATE 2018, pp. 851\u2013856. IEEE (2018)","DOI":"10.23919\/DATE.2018.8342124"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Drzevitzky, S., Kastens, U., Platzner, M.: Proof-carrying hardware: towards runtime verification of reconfigurable modules. In: 2009 International Conference on Reconfigurable Computing and FPGAs, pp. 189\u2013194. IEEE (2009)","DOI":"10.1109\/ReConFig.2009.31"},{"key":"6_CR10","unstructured":"Filman, R., Havelund, K.: Source-code instrumentation and quantification of events. In: Foundations of Aspect-Oriented Languages (FOAL 2002), No. TR 02-06, April 2002. http:\/\/www.cs.ucf.edu\/~leavens\/FOAL\/papers-2002\/TR.pdf"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Flanagan, C., Freund, S.N.: FastTrack: efficient and precise dynamic race detection. In: Hind, M., Diwan, A. (eds.) Proceedings 2009 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2009, pp. 121\u2013133. ACM (2009)","DOI":"10.1145\/1543135.1542490"},{"key":"6_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"532","DOI":"10.1007\/978-3-319-91908-9_25","volume-title":"Computing and Software Science","author":"K Havelund","year":"2019","unstructured":"Havelund, K., Reger, G., Ro\u015fu, G.: Runtime verification past experiences and future projections. In: Steffen, B., Woeginger, G. (eds.) Computing and Software Science. LNCS, vol. 10000, pp. 532\u2013562. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-319-91908-9_25"},{"issue":"2","key":"6_CR13","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1016\/S1571-0661(04)00253-1","volume":"55","author":"K Havelund","year":"2001","unstructured":"Havelund, K., Rosu, G.: Monitoring Java programs with Java PathExplorer. Electron. Notes Theor. Comput. Sci. 55(2), 200\u2013217 (2001). https:\/\/doi.org\/10.1016\/S1571-0661(04)00253-1","journal-title":"Electron. Notes Theor. Comput. Sci."},{"issue":"2","key":"6_CR14","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1023\/B:FORM.0000017721.39909.4b","volume":"24","author":"K Havelund","year":"2004","unstructured":"Havelund, K., Rosu, G.: An overview of the runtime verification tool Java PathExplorer. Formal Methods Syst. Des. 24(2), 189\u2013215 (2004). https:\/\/doi.org\/10.1023\/B:FORM.0000017721.39909.4b","journal-title":"Formal Methods Syst. Des."},{"key":"6_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-03769-7_1","volume-title":"Runtime Verification","author":"K Havelund","year":"2018","unstructured":"Havelund, K., Ro\u015fu, G.: Runtime Der. In: Colombo, C., Leucker, M. (eds.) RV 2018. LNCS, vol. 11237, pp. 3\u201317. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03769-7_1"},{"issue":"3","key":"6_CR16","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1002\/stvr.1564","volume":"25","author":"S Hong","year":"2015","unstructured":"Hong, S., Kim, M.: A survey of race bug detection techniques for multithreaded programmes. Softw. Test. Verif. Reliab. 25(3), 191\u2013217 (2015)","journal-title":"Softw. Test. Verif. Reliab."},{"key":"6_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1007\/978-3-030-03769-7_28","volume-title":"Runtime Verification","author":"J Jahic","year":"2018","unstructured":"Jahic, J., Jung, M., Kuhn, T., Kestel, C., Wehn, N.: A framework for non-intrusive trace-driven simulation of manycore architectures with dynamic tracing configuration. In: Colombo, C., Leucker, M. (eds.) RV 2018. LNCS, vol. 11237, pp. 458\u2013468. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03769-7_28"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Jaksic, S., Bartocci, E., Grosu, R., Kloibhofer, R., Nguyen, T., Nickovic, D.: From signal temporal logic to FPGA monitors. In: 13. ACM\/IEEE International Conference on Formal Methods and Models for Codesign, MEMOCODE 2015, pp. 218\u2013227. IEEE (2015)","DOI":"10.1109\/MEMCOD.2015.7340489"},{"key":"6_CR19","unstructured":"Jak\u0161ic, S., Li, D., Pun, K.I., Stolz, V.: Stream-based dynamic data race detection. In: 31st Norsk Informatikkonferanse, NIK 2018. Bibsys Open Journal Systems, Norway (2018). https:\/\/ojs.bibsys.no\/index.php\/NIK\/article\/view\/511"},{"key":"6_CR20","unstructured":"Joe, N.: Concurrent programming, with examples, March 2020. https:\/\/begriffs.com\/posts\/2020-03-23-concurrent-programming.html"},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Leucker, M., S\u00e1nchez, C., Scheffel, T., Schmitz, M., Schramm, A.: TeSSLa: runtime verification of non-synchronized real-time streams. In: ACM Symposium on Applied Computing (SAC), pp. 1925\u20131933. ACM (2018)","DOI":"10.1145\/3167132.3167338"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Lucia, B., Ceze, L., Strauss, K., Qadeer, S., Boehm, H.: Conflict exceptions: simplifying concurrent language semantics with precise hardware exceptions for data-races. In: Seznec, A., Weiser, U.C., Ronen, R. (eds.) 37th International Symposium on Computer Architecture (ISCA 2010), pp. 210\u2013221. ACM (2010)","DOI":"10.1145\/1816038.1815987"},{"key":"6_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1007\/978-3-319-67531-2_24","volume-title":"Runtime Verification","author":"HS Matar","year":"2017","unstructured":"Matar, H.S., Tasiran, S., Unat, D.: EmbedSanitizer: runtime race detection tool for 32-bit embedded ARM. In: Lahiri, S., Reger, G. (eds.) RV 2017. LNCS, vol. 10548, pp. 380\u2013389. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-67531-2_24"},{"key":"6_CR24","unstructured":"MIRA Ltd.: MISRA C:2012 Guidelines for the use of the C language in critical systems (2013)"},{"issue":"1","key":"6_CR25","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/s10703-017-0275-x","volume":"51","author":"P Moosbrugger","year":"2017","unstructured":"Moosbrugger, P., Rozier, K.Y., Schumann, J.: R2U2: monitoring and diagnosis of security threats for unmanned aerial systems. Formal Methods Syst. Design 51(1), 31\u201361 (2017). https:\/\/doi.org\/10.1007\/s10703-017-0275-x","journal-title":"Formal Methods Syst. Design"},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"Preu\u00dfer, T., Weiss, A.: The CEDARtools platform - massive external memory with high bandwidth and low latency under fine-granular random access patterns. In: Sourdis, I., Bouganis, C., \u00c1lvarez, C., D\u00edaz, L.A.T., Valero-Lara, P., Martorell, X. (eds.) 29th International Conference on Field Programmable Logic and Applications, FPL 2019, pp. 426\u2013427. IEEE (2019)","DOI":"10.1109\/FPL.2019.00079"},{"issue":"4","key":"6_CR27","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1145\/265924.265927","volume":"15","author":"S Savage","year":"1997","unstructured":"Savage, S., Burrows, M., Nelson, G., Sobalvarro, P., Anderson, T.E.: Eraser: a dynamic data race detector for multithreaded programs. ACM Trans. Comput. Syst. 15(4), 391\u2013411 (1997)","journal-title":"ACM Trans. Comput. Syst."},{"key":"6_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1007\/978-3-642-29860-8_9","volume-title":"Runtime Verification","author":"K Serebryany","year":"2012","unstructured":"Serebryany, K., Potapenko, A., Iskhodzhanov, T., Vyukov, D.: Dynamic race detection with LLVM compiler. In: Khurshid, S., Sen, K. (eds.) RV 2011. LNCS, vol. 7186, pp. 110\u2013114. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-29860-8_9"},{"issue":"5","key":"6_CR29","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1049\/iet-sen:20060076","volume":"1","author":"C Watterson","year":"2007","unstructured":"Watterson, C., Heffernan, D.: Runtime verification and monitoring of embedded systems. IET Softw. 1(5), 172\u2013179 (2007)","journal-title":"IET Softw."},{"issue":"4\u20135","key":"6_CR30","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1504\/IJHPCN.2017.086532","volume":"10","author":"Z Yu","year":"2017","unstructured":"Yu, Z., Yang, Z., Su, X., Ma, P.: Evaluation and comparison of ten data race detection techniques. Int. J. High Perform. Comput. Network. 10(4\u20135), 279\u2013288 (2017)","journal-title":"Int. J. High Perform. Comput. Network."}],"container-title":["Lecture Notes in Computer Science","Formal Methods in Outer Space"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-87348-6_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,17]],"date-time":"2021-10-17T18:10:39Z","timestamp":1634494239000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-87348-6_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030873479","9783030873486"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-87348-6_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"17 October 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}