{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,28]],"date-time":"2025-02-28T05:34:54Z","timestamp":1740720894117,"version":"3.38.0"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2004,10,1]],"date-time":"2004-10-01T00:00:00Z","timestamp":1096588800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/2.0"},{"start":{"date-parts":[[2004,10,1]],"date-time":"2004-10-01T00:00:00Z","timestamp":1096588800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Braz Comp Soc"],"published-print":{"date-parts":[[2004,10]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In this paper the behavior of assertion-based error detection mechanisms is characterized under faults injected according to a quite general fault model. Assertions based on the knowledge of the application can be very effective at detecting corruption of critical data caused by hardware faults. The main drawbacks of that approach are identified as being the lack of protection of data outside the section covered by assertions, namely during input and output, and the possible incorrect execution of the assertions.<\/jats:p><jats:p>To handle those weak-points the Robust Assertions technique is proposed, whose effectiveness is shown by extensive fault injection experiments. With this technique a system follows a new failure model, that is called Fail-Bounded, where with high probability all results produced are either correct or, if wrong, they are within a certain bound of the correct value, whose exact distance depends on the output assertions used.<\/jats:p><jats:p>Any kind of assertions can be considered, from simple likelihood tests to high coverage assertions such as those used in the Algorithm Based Fault Tolerance paradigm. We claim that this failure model is very useful to describe the behavior of many low-cost fault-tolerant systems, that have low hardware and software redundancy, like embedded systems, were cost is a severe restriction, yet full availability is expected.<\/jats:p>","DOI":"10.1007\/bf03192363","type":"journal-article","created":{"date-parts":[[2010,11,12]],"date-time":"2010-11-12T04:44:56Z","timestamp":1289537096000},"page":"18-30","source":"Crossref","is-referenced-by-count":0,"title":["Robust assertions and fail-bounded behavior"],"prefix":"10.1007","volume":"10","author":[{"given":"Paula","family":"Prata","sequence":"first","affiliation":[]},{"given":"Mario","family":"Rela","sequence":"additional","affiliation":[]},{"given":"Henrique","family":"Madeira","sequence":"additional","affiliation":[]},{"given":"Jo\u00e3o Gabriel","family":"Silva","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"6","key":"BF03192363_CR1","doi-asserted-by":"publisher","first-page":"1828","DOI":"10.1109\/23.211373","volume":"39","author":"A. Campbell","year":"1992","unstructured":"A. Campbell, P. McDonald and K. Ray. Single Event Upset Rates in Space. IEEE Trans. on Nuclear Science, 39(6): 1828\u20131835, 1992.","journal-title":"IEEE Trans. on Nuclear Science"},{"doi-asserted-by":"crossref","unstructured":"C. Constantinescu. Impact of Deep Submicron Technology on Dependability of VLSI Circuits. In Proc. Int\u2019l Conf. on Dependable Systems and Networks. Pages 205\u2013209, 2002.","key":"BF03192363_CR2","DOI":"10.1109\/DSN.2002.1028901"},{"unstructured":"P. Shivakumar, M. Kistler, S. W. Keckler, D. Burger and L. Alvisi. Modeling the Effect of Technology Trends on the Soft Error Rate of Combinational Logic.In Proc. Int\u2019l Conf. on Dependable Systems and Networks. Pages 389\u2013398, 2002.","key":"BF03192363_CR3"},{"doi-asserted-by":"crossref","unstructured":"D. Powell, P. Ver\u00edssimo, G. Bonn, F. Waeselynck, and D. Seaton. The Delta-4 Approach to Dependability in Open Distributed Computing Systems.In Proc. 18th Int\u2019l Symp. Fault-Tolerant Computing. Pages 246\u2013251, 1988.","key":"BF03192363_CR4","DOI":"10.1109\/FTCS.1988.5327"},{"doi-asserted-by":"crossref","unstructured":"H. Madeira and J. G. Silva. Experimental Evaluation of the Fail-Silent Behavior in Computers Without Error Masking.In Proc. 24th Int\u2019l Symp. Fault Tolerant Computing Systems. Pages 350\u2013359, 1994.","key":"BF03192363_CR5","DOI":"10.1109\/FTCS.1994.315625"},{"doi-asserted-by":"crossref","unstructured":"M. Z. Rela, H. Madeira, and J. G. Silva. Experimental Evaluation of the Fail-Silent Behavior of Programs with Consistency Checks.In Proc. 26th Int\u2019l Symp. Fault-Tolerant Computing. Pages 394\u2013403, 1996.","key":"BF03192363_CR6","DOI":"10.1109\/FTCS.1996.534625"},{"doi-asserted-by":"crossref","unstructured":"J. G. Silva, J. Carreira, H. Madeira, D. Costa, and F. Moreira. Experimental Assessment of Parallel Systems.In Proc. 26th Int\u2019l Symp. Fault-Tolerant Computing. Pages 415\u2013424, 1996.","key":"BF03192363_CR7","DOI":"10.1109\/FTCS.1996.534627"},{"issue":"2","key":"BF03192363_CR8","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1109\/12.2145","volume":"37","author":"A. Mahmood","year":"1988","unstructured":"A. Mahmood and E. J. McCluskey. Concurrent Error Detection Using Watchdog Processors \u2014 A Survey.IEEE Trans. Computers, 37(2): 160\u2013174, 1988.","journal-title":"IEEE Trans. Computers"},{"issue":"6","key":"BF03192363_CR9","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1109\/43.55193","volume":"9","author":"K. Wilken","year":"1990","unstructured":"K. Wilken and J. P. Shen. Continous Monitoring: Low-Cost Concurrent Detection of Processor Control Errors.IEEE Trans. on Computer-Aided Design, 9(6): 629\u2013641, 1990.","journal-title":"IEEE Trans. on Computer-Aided Design"},{"issue":"6","key":"BF03192363_CR10","doi-asserted-by":"publisher","first-page":"627","DOI":"10.1109\/71.774911","volume":"10","author":"Z. Alkhalifa","year":"1999","unstructured":"Z. Alkhalifa, V. S. S. Nair, N. Krishnamurthy, J. A. Abraham. Design and Evaluation of System-Level Checks for On-Line Control Flow Error Detection.IEEE Trans. on Parallel and Distributed Systems, 10(6): 627\u2013641, 1999.","journal-title":"IEEE Trans. on Parallel and Distributed Systems"},{"unstructured":"G. Miremadi, J. Ohlsson, M. Rimen, and J. Karlsson. Use of Time and Address Signatures for Control Flow Checking.5th Int\u2019l IFIP Conference on Dependable Computing for Critical Applications (DCCA-5), ISBN 0-8186-7803-8, IEEE Computer Society Press, February 1998.","key":"BF03192363_CR11"},{"unstructured":"A. Steininger and C. Scherrer. On Finding An Optimal Combination Of Error Detection Mechanisms Based On Results Of Fault Injection Experiments.In Proc. of the 27th Int\u2019l Symp. on Fault-Tolerant Computing, IEEE Computer Society Press, 1997.","key":"BF03192363_CR12"},{"unstructured":"A. Mahmood, E. J. McCluskey, and D. J. Lu. Concurrent Fault Detection Using a Watchdog Processor and Assertions.In Proc. Int\u2019l Test Conference. Pages 622\u2013628, 1983.","key":"BF03192363_CR13"},{"doi-asserted-by":"crossref","unstructured":"M. Turmon, R. Granat, and D. S. Katz. Software-Implemented Fault Detection for High-Performance Space Applications.In Proc. 30th Int\u2019l Conf. on Dependable Systems and Networks (FTCS-30 & DCCA-8). Pages 107\u2013116, 2000.","key":"BF03192363_CR14","DOI":"10.1109\/ICDSN.2000.857522"},{"issue":"6","key":"BF03192363_CR15","doi-asserted-by":"publisher","first-page":"518","DOI":"10.1109\/TC.1984.1676475","volume":"33","author":"K.-H. Huang","year":"1984","unstructured":"K.-H. Huang and J. A. Abraham. Algorithm-Based Fault Tolerance for Matrix Operations.IEEE Trans. Computers, c-33(6):518\u2013528, 1984.","journal-title":"IEEE Trans. Computers"},{"issue":"3","key":"BF03192363_CR16","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1145\/357172.357176","volume":"4","author":"L. Lamport","year":"1982","unstructured":"L. Lamport, R. Shostak, and M. Pease. The Byzantine Generals Problem.ACM Trans. Prog. Lang. Syst. 4(3):382\u2013401, 1982.","journal-title":"ACM Trans. Prog. Lang. Syst."},{"issue":"9","key":"BF03192363_CR17","doi-asserted-by":"publisher","first-page":"1132","DOI":"10.1109\/12.57055","volume":"39","author":"P. Banerjee","year":"1990","unstructured":"P. Banerjee, J. T. Rahmed, C. Stunkel, V. S. Nair, K. Roy, V. Balasubramanian, and J.A. Abraham. Algorithm-Based Fault Tolerance on a Hypercube Multiprocessor.IEEE Trans. Computers, 39(9): 1132\u20131144, 1990.","journal-title":"IEEE Trans. Computers"},{"doi-asserted-by":"crossref","unstructured":"A. R. Chowdhury and P. Banerjee. Algorithm-Based Fault Location and Recovery for Matrix Computations.In Proc. 24th Int\u2019l Symp. Fault-Tolerant Computing. Pages 38\u201347, 1994.","key":"BF03192363_CR18","DOI":"10.1109\/FTCS.1994.315659"},{"issue":"5","key":"BF03192363_CR19","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1109\/12.4614","volume":"37","author":"Y.-H. Choi","year":"1988","unstructured":"Y.-H. Choi and M. Malek, A Fault-Tolerant FFT processor.IEEE Trans. Computers, 37(5): 617\u2013621, 1988.","journal-title":"IEEE Trans. Computers"},{"doi-asserted-by":"crossref","unstructured":"A. R. Chowdhury and P. Banerjee. Compiler-Assisted Generation of Error Detection Parallel Programs.In Proc. 26th Int\u2019l Symp. Fault-Tolerant Computing. Pages 360\u2013369, 1996.","key":"BF03192363_CR20","DOI":"10.1109\/FTCS.1996.534621"},{"issue":"4","key":"BF03192363_CR21","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1109\/TC.1986.1676762","volume":"35","author":"P. Banerjee","year":"1986","unstructured":"P. Banerjee and J. A. Abraham. Bounds on Algorithm-Based Fault Tolerance in Multiple Processor Systems.IEEE Transactions on Computers, c-35(4): 296\u2013306, 1986.","journal-title":"IEEE Transactions on Computers"},{"issue":"10","key":"BF03192363_CR22","doi-asserted-by":"publisher","first-page":"1099","DOI":"10.1109\/71.313125","volume":"5","author":"B. Vinnakota","year":"1994","unstructured":"B. Vinnakota and N. K. Jha. Design of Algorithm-Based Fault-Tolerant Multiprocessor Systems for Concurrent Error Detection and Fault Diagnosis.IEEE Trans. Parallel and Distributed Systems, 5(10): 1099\u20131106, 1994","journal-title":"IEEE Trans. Parallel and Distributed Systems"},{"issue":"2","key":"BF03192363_CR23","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1109\/71.577256","volume":"8","author":"S. Yajnik","year":"1997","unstructured":"S. Yajnik and N. K. Jha. Graceful Degradation in Algorithm-Based Fault Tolerant Multiprocessor Systems.IEEE Trans. Parallel and Distributed Systems, 8(2): 137\u2013153, 1997.","journal-title":"IEEE Trans. Parallel and Distributed Systems"},{"issue":"7","key":"BF03192363_CR24","doi-asserted-by":"publisher","first-page":"780","DOI":"10.1109\/12.237719","volume":"42","author":"R. K. Sitaraman","year":"1993","unstructured":"R. K. Sitaraman and N. K. Jha. Optimal Design of Checks for Error Detection and Location in Fault-Tolerant Multiprocessor Systems.IEEE Trans. Computers, 42(7): 780\u2013793, 1993.","journal-title":"IEEE Trans. Computers"},{"issue":"2","key":"BF03192363_CR25","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1109\/32.666826","volume":"24","author":"J. Carreira","year":"1998","unstructured":"J. Carreira, H. Madeira, and J. G. Silva. Xception: A Technique for the Experimental Evaluation of Dependability in Modern Computers.IEEE Trans. Software Eng., 24(2): 125\u2013135, 1998.","journal-title":"IEEE Trans. Software Eng."},{"doi-asserted-by":"crossref","unstructured":"P. Duba and R. K. Iyer. Transient Fault Behavior in a Microprocessor: A Case Study.Presented at ICCD. Pages 272\u2013276, 1988.","key":"BF03192363_CR26","DOI":"10.1109\/ICCD.1988.25705"},{"unstructured":"ANSI\/IEEE. IEEE Standard for Binary Floating-Point Arithmetic, 1985.","key":"BF03192363_CR27"},{"unstructured":"Motorola. PowerPC 601 Risc Microprocessor user\u2019s Manual, 1993.","key":"BF03192363_CR28"},{"doi-asserted-by":"crossref","unstructured":"A. R. Chowdhury and P. Banerjee. Tolerance Determination for Algorithm-Based Checks Using Simplified Error Analysis Techniques.In Proc. 23rd Int\u2019l Symp. Fault-Tolerant Computing. Pages 290\u2013298, 1993.","key":"BF03192363_CR29","DOI":"10.1109\/FTCS.1993.627332"},{"key":"BF03192363_CR30","volume-title":"High Coverage Assertions","author":"P. Prata","year":"2000","unstructured":"P. Prata. High Coverage Assertions. PhD Thesis, Universidade da Beira Interior, Portugal, 180 pages, September 2000."},{"doi-asserted-by":"crossref","unstructured":"D. Powell, M. Cukier, and J. Arlat. On Stratified Sampling for High Coverage Estimations.In Proc. 2nd European Dependable Computing Conference. Pages 37\u201354, 1996.","key":"BF03192363_CR31","DOI":"10.1007\/3-540-61772-8_29"},{"issue":"4","key":"BF03192363_CR32","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1145\/357401.357402","volume":"2","author":"J. H. Saltzer","year":"1984","unstructured":"J. H. Saltzer, D. P. Reed, and D. D. Clark. End-To-End Arguments in System Design.ACM Trans. Computer Systems, 2(4): 277\u2013288, 1984.","journal-title":"ACM Trans. Computer Systems"},{"doi-asserted-by":"crossref","unstructured":"J. Cunha, R. Maia, M. Z. Rela, J. G. Silva. A Study of Failure Models in Feedback Control Systems.In Proc. The Int\u2019l Conf. on Dependable Systems and Networks (DSN-2001). Pages 314\u2013323, 2001.","key":"BF03192363_CR33","DOI":"10.1109\/DSN.2001.941416"},{"doi-asserted-by":"crossref","unstructured":"N. Oh, P. P. Shirvani and E. J. McCluskey. Control Flow Checking by Software Signatures.In IEEE Trans. on Reliability, 51(1), 2002.","key":"BF03192363_CR34","DOI":"10.1109\/24.994926"},{"doi-asserted-by":"crossref","unstructured":"J. G. Silva, P. Prata, M. Z. Rela and H. Madeira. Practical Issues in the Use of ABFT and a New Failure Model.In Proc. 28th Int\u2019l Symposium on Fault-Tolerant Computing. Pages 26\u201335, 1998.","key":"BF03192363_CR35","DOI":"10.1109\/FTCS.1998.689452"},{"issue":"2","key":"BF03192363_CR36","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1109\/TSE.1975.6312842","volume":"1","author":"B. Randell","year":"1975","unstructured":"B. Randell. System Structure for Software Fault-Tolerance.IEEE Trans. Software Eng., SE-1(2): 220\u2013232, 1975.","journal-title":"IEEE Trans. Software Eng."},{"unstructured":"D. M. Andrews. Using Executable Assertions for Testing and Fault Tolerance.In Proc. 9th Int\u2019l Symp. Fault-Tolerant Computing. Pages 102\u2013105, 1979.","key":"BF03192363_CR37"},{"doi-asserted-by":"crossref","unstructured":"B. McMillin and L. M. Ni. Executable Assertion Development for the Distributed Parallel Environment.In Proc. 12th Int\u2019l COMPSAC. Pages 284\u2013291, 1988.","key":"BF03192363_CR38","DOI":"10.1109\/CMPSAC.1988.17187"},{"unstructured":"N. Leveson and T. J. Shimeall. Safety Assertions for Process-Control Systems.In Proc. 13th Int\u2019l Symp. Fault-Tolerant Computing. Pages 236\u2013240, 1983.","key":"BF03192363_CR39"},{"doi-asserted-by":"crossref","unstructured":"A. Watanabe and K. Sakamura. Design Fault Tolerance in Operating Systems Based on a Standardization Project.In Proc. 25th Int\u2019l Symp. on Fault-Tolerant Computing. Pages 372\u2013380, 1995.","key":"BF03192363_CR40","DOI":"10.1109\/FTCS.1995.466962"},{"doi-asserted-by":"crossref","unstructured":"N. P. Kropp, P. J. Koopman and D. P.Siewiorek. Automated Robustness Testing of Off-the-Shelf Software Components.In 28th Int\u2019l Symposium on Fault-Tolerant Computing. Pages 230\u2013239, 1998.","key":"BF03192363_CR41","DOI":"10.1109\/FTCS.1998.689474"},{"doi-asserted-by":"crossref","unstructured":"R. A. Maxion and R. T. Olszewski. Improving Software Robustness with Dependability Cases.In 28th Int\u2019l Symposium on Fault-Tolerant Computing. Pages 346\u2013355, 1998.","key":"BF03192363_CR42","DOI":"10.1109\/FTCS.1998.689485"},{"unstructured":"J. Pan, P. Koopman, D. Siewiorek, Y. Huang, R. Gruber and M. L. Jiang. Robustness Testing and Hardening of Corba ORB Implementations.In Int\u2019l Conference on Dependable Systems and Networks. Pages 141\u2013150, 2001.","key":"BF03192363_CR43"},{"unstructured":"C. Fetzer and Z. Xiao. HEALERS: A Toolkit for Enhancing the Robustness and Security of Existing Applications.In Int\u2019l Conference on Dependable Systems and Networks, 2003.","key":"BF03192363_CR44"},{"unstructured":"N. Higham. Accuracy and Stability of Numerical Algorithms. SIAM, 688 pages, 1996.","key":"BF03192363_CR45"},{"issue":"6","key":"BF03192363_CR46","doi-asserted-by":"publisher","first-page":"826","DOI":"10.1145\/268999.269003","volume":"44","author":"H. Wasserman","year":"1997","unstructured":"H. Wasserman and M. Blum. Software Reliability via Run-Time Result-Checking.Journal of the ACM, 44(6): 826\u2013849, 1997.","journal-title":"Journal of the ACM"},{"doi-asserted-by":"crossref","unstructured":"J. P. Vinter, J. Aidemark, P. Folkesson, and J. Karlsson. Reducing Critical Failures for Control Algorithms Using Executable Assertions and Best Effort Recovery.In Proc. Int\u2019l Conf. on Dependable Systems and Networks.Pages 347\u2013356, 2001.","key":"BF03192363_CR47","DOI":"10.1109\/DSN.2001.941419"},{"doi-asserted-by":"crossref","unstructured":"J. P. Vinter, A. Johansson, P. Folkesson, and J. Karlsson. On the Design of Robust Integrators for Fail-Bounded Control Systems.In Proc. Int\u2019l Conf. on Dependable Systems and Networks. Pages 415\u2013424, 2003.","key":"BF03192363_CR48","DOI":"10.1109\/DSN.2003.1209952"},{"doi-asserted-by":"crossref","unstructured":"D. Powell. Failure Mode Assumptions and Assumption Coverage.In Proc. 22nd Int\u2019l Symp. Fault-Tolerant Computing. Pages 386\u2013395, 1992.","key":"BF03192363_CR49","DOI":"10.1109\/FTCS.1992.243562"}],"container-title":["Journal of the Brazilian Computer Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03192363.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/BF03192363\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.springerlink.com\/index\/pdf\/10.1007\/BF03192363","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03192363.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,27]],"date-time":"2025-02-27T20:05:22Z","timestamp":1740686722000},"score":1,"resource":{"primary":{"URL":"https:\/\/journal-bcs.springeropen.com\/articles\/10.1007\/BF03192363"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,10]]},"references-count":49,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2004,10]]}},"alternative-id":["BF03192363"],"URL":"https:\/\/doi.org\/10.1007\/bf03192363","relation":{},"ISSN":["0104-6500","1678-4804"],"issn-type":[{"type":"print","value":"0104-6500"},{"type":"electronic","value":"1678-4804"}],"subject":[],"published":{"date-parts":[[2004,10]]}}}