{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T04:15:01Z","timestamp":1750997701018,"version":"3.41.0"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319685410"},{"type":"electronic","value":"9783319685427"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-68542-7_73","type":"book-chapter","created":{"date-parts":[[2017,11,1]],"date-time":"2017-11-01T15:23:50Z","timestamp":1509549830000},"page":"823-828","source":"Crossref","is-referenced-by-count":0,"title":["Masking Signature Data Errors of Software-Based Control Flow Checking Techniques Employing Redundancy Signature"],"prefix":"10.1007","author":[{"given":"Liping","family":"Liu","sequence":"first","affiliation":[]},{"given":"Linlin","family":"Ci","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,2]]},"reference":[{"key":"73_CR1","doi-asserted-by":"crossref","unstructured":"Bhattacharya, K., Ranganathan, N.: RADJAM: a novel approach for reduction of soft errors in logic circuits. In: International Conference on VLSI Design, pp. 453\u2013458 (2009)","DOI":"10.1109\/VLSI.Design.2009.76"},{"key":"73_CR2","unstructured":"Zhu, D., Aydin, H.: Reliability effects of process and thread redundancy on chip multiprocessors. In: Dependable Systems and Networks (2006)"},{"key":"73_CR3","doi-asserted-by":"crossref","unstructured":"Jafari-Nodoushan, M., Miremadi, S.G., Ejlali, A.: Control-flow checking using branch instructions. In: International Conference on Embedded and Ubiquitous Computing, pp. 66\u201372. IEEE Press, Shanghai (2008)","DOI":"10.1109\/EUC.2008.44"},{"key":"73_CR4","first-page":"664","volume":"5","author":"SA Asghari","year":"2012","unstructured":"Asghari, S.A., Abdi, A., Taheri, H., et al.: SEDSR: soft error detection using software redundancy. J. IJSEA 5, 664\u2013670 (2012)","journal-title":"J. IJSEA"},{"key":"73_CR5","first-page":"4367","volume":"4","author":"SA Asghari","year":"2012","unstructured":"Asghari, S.A., Abdi, A., Taheri, H., et al.: I2BCFC: an effective intra-inter block control flow checking method against single event upsets. J. Res. J. Appl. Sci. Eng. Tech. 4, 4367\u20134379 (2012)","journal-title":"J. Res. J. Appl. Sci. Eng. Tech."},{"key":"73_CR6","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1109\/24.994926","volume":"51","author":"N Oh","year":"2002","unstructured":"Oh, N., Shirvani, P.P., Mccluskey, E.J.: Control-flow checking by software signatures. J. IEEE T Reliab. 51, 111\u2013122 (2002)","journal-title":"J. IEEE T Reliab."},{"key":"73_CR7","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1016\/j.compeleceng.2008.08.010","volume":"36","author":"A Li","year":"2010","unstructured":"Li, A., Hong, B.: On-line control flow error detection using relationship signatures among basic blocks. J. Comput. Electr. Eng. 36, 132\u2013141 (2010)","journal-title":"J. Comput. Electr. Eng."},{"key":"73_CR8","first-page":"413","volume":"26","author":"Y Mu","year":"2013","unstructured":"Mu, Y., Hao, W., Zheng, Y., et al.: Graph-tree-based software control flow checking for COTS processors on pico-satellites. J. CJA 26, 413\u2013422 (2013)","journal-title":"J. CJA"},{"key":"73_CR9","doi-asserted-by":"crossref","first-page":"959","DOI":"10.1016\/j.microrel.2005.07.108","volume":"46","author":"A Rajabzadeh","year":"2006","unstructured":"Rajabzadeh, A., Miremadi, S.G.: CFCET: a hardware-based control flow checking technique in COTS processors using execution tracing. J. Microelectron. Reliab. 46, 959\u2013972 (2006)","journal-title":"J. Microelectron. Reliab."},{"key":"73_CR10","doi-asserted-by":"crossref","unstructured":"Wang, N.J., Patel, S.J.: ReStore: symptom-based soft error detection in microprocessors. In: 35th Dependable Systems and Networks, pp. 188\u2013201. IEEE Press, Yokohama (2005)","DOI":"10.1109\/TDSC.2006.40"},{"key":"73_CR11","doi-asserted-by":"crossref","unstructured":"Qureshi, M.K., Mutlu, O., Patt, Y.N.: Microarchitecture-based introspection: a technique for transient-fault tolerance in microprocessors. In: 35th Dependable Systems and Networks, pp. 434\u2013443. IEEE Press, Yokohama (2005)","DOI":"10.1109\/DSN.2005.62"},{"key":"73_CR12","doi-asserted-by":"crossref","unstructured":"Yu, J., Garzaran, M.J., Snir, M.: ESoftCheck: removal of non-vital checks for fault tolerance. In 2009 International Symposium on Code Generation and Optimization, pp. 35\u201346. IEEE, Seattle (2009)","DOI":"10.1109\/CGO.2009.14"}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-68542-7_73","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T20:44:45Z","timestamp":1750970685000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-68542-7_73"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319685410","9783319685427"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-68542-7_73","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}