{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T20:52:01Z","timestamp":1773521521425,"version":"3.50.1"},"reference-count":139,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3509633","type":"journal-article","created":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T18:41:02Z","timestamp":1733164862000},"page":"180939-180967","source":"Crossref","is-referenced-by-count":20,"title":["Dependability in Embedded Systems: A Survey of Fault Tolerance Methods and Software-Based Mitigation Techniques"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3430-9706","authenticated-orcid":false,"given":"Mohammadreza Amel","family":"Solouki","sequence":"first","affiliation":[{"name":"Department of Control and Computer Engineering, Politecnico di Torino, Turin, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2289-6381","authenticated-orcid":false,"given":"Shaahin","family":"Angizi","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, New Jersey Institute of Technology, Newark, NJ, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5821-3418","authenticated-orcid":false,"given":"Massimo","family":"Violante","sequence":"additional","affiliation":[{"name":"Department of Control and Computer Engineering, Politecnico di Torino, Turin, Italy"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-2113-9"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2011.941888"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2019.2939757"},{"key":"ref4","first-page":"547","article-title":"Safety critical systems: Challenges and directions","volume-title":"Proc. 24th Int. Conf. Softw. Eng.","author":"Knight"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1016\/B978-0-12-811978-5.00010-9","article-title":"10 - trends and challenges","volume-title":"Encapsulation Technologies for Electronic Applications","author":"Ardebili","year":"2019"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/DDECS.2012.6219086"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2013.040"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ETS.2016.7519325"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TDMR.2008.2002351"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1201\/9781315217864"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ETS48528.2020.9131597"},{"issue":"11","key":"ref12","doi-asserted-by":"crossref","first-page":"2837","DOI":"10.1016\/j.microrel.2012.06.004","article-title":"Studying the effects of intermittent faults on a microcontroller","volume":"52","author":"Gil-Tom\u00e1s","year":"2012","journal-title":"Microelectron. Rel."},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2522968.2522976"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2007.364597"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1002\/9781118084328"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-6993-4_2"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-31069-5"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TDMR.2005.853449"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/VLSI.2008.28"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/RADECS.1997.698915"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2011.2134054"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4020-5646-8"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-14352-1_1"},{"key":"ref24","volume-title":"Applying Dual-core Lockstep in Embedded Processors To Mitigate Radiation-induced Soft Errors","author":"Oliveira","year":"2017"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/2.56849"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2015.2417501"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1015047.1015049"},{"key":"ref28","volume-title":"Better Embedded System Software","author":"Koopman","year":"2010"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-32937-4"},{"key":"ref30","volume-title":"Fault-Tolerant Systems","author":"Koren","year":"2020"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2017.2762903"},{"key":"ref32","doi-asserted-by":"crossref","DOI":"10.1016\/j.micpro.2022.104572","article-title":"Safety and security collaborative analysis framework for high-performance embedded computing devices","volume":"93","author":"Yarza","year":"2022","journal-title":"Microprocessors Microsyst."},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-40131-3_7"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3144217"},{"key":"ref35","volume-title":"Fault-tolerant Systems","author":"Koren","year":"2020"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/VLSID60093.2024.00119"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/AERO.2010.5446663"},{"key":"ref38","article-title":"Hardware versus software fault injection of modern undervolted SRAMs","author":"Abdullah Soyturk","year":"2019","journal-title":"arXiv:1912.00154"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/871656.859620"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2005.78"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/tvlsi.2006.874378"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2807591.2807659"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/4858826"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2949652"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/EUROCON.2011.5929215"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/12.2145"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.1999.809458"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ETS.2007.39"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/S1474-6670(17)51841-8"},{"key":"ref50","first-page":"1","article-title":"The evolution of the recovery block concept","volume":"3","author":"Randell","year":"1995","journal-title":"Softw. Fault Tolerance"},{"key":"ref51","first-page":"23","article-title":"The methodology of N-version programming","volume-title":"Software Fault Tolerance","author":"Avizienis","year":"1995"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-79789-7_7"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.233463"},{"key":"ref54","volume":"132","author":"Pradhan","year":"1996","journal-title":"Fault-Tolerant Computer System Design"},{"key":"ref55","volume-title":"Software fault tolerance: A tutorial","author":"Torres-Pomales","year":"2000"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1996.534625"},{"key":"ref57","volume-title":"Checkpointing and the modeling of program execution time","author":"Nicola","year":"1994"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1995.466997"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/LATW.2016.7483347"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TNS.2013.2246798"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/RADECS.2007.5205504"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2013.6699483"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.55"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/2.191981"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/3301311"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2593195"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/OLT.2003.1214381"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/VTS.2013.6548908"},{"key":"ref69","volume-title":"Control flow deviation detection for software security","author":"Abraham","year":"2009"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/3372799.3394360"},{"key":"ref72","volume-title":"Architecture Design for Soft Errors","author":"Mukherjee","year":"2011"},{"key":"ref73","volume-title":"A foundation for the accurate prediction of the soft error vulnerability of scientific applications","author":"Bronevetsky","year":"2009"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2004.24"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.4"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.70"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/AERO.1996.495891"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/24.994926"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.101"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/2465554.2465568"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2018.00036"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/TNS.2014.2310492"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2317736"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/CODESISSS.2015.7331368"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3279731"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/71.774911"},{"key":"ref87","first-page":"183","article-title":"Control flow checking using assertions","volume":"10","author":"McFearin","year":"1998","journal-title":"Dependable Comput. Fault Tolerant Syst."},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/OLT.2003.1214380"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/RAMS.2005.1408426"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2013.2248373"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/TNS.2015.2484842"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1016\/j.ast.2006.06.006"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2017.2754548"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/DFTVS.2003.1250159"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99130-6_15"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1016\/j.microrel.2012.03.033"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/DFTVS.2003.1250158"},{"key":"ref98","volume-title":"Autosar: Specification of Watchdog Manager (2011)","year":"2022"},{"key":"ref99","volume-title":"Autosar: Specification of Operating System (2011)","year":"2022"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1145\/2043910.2043925"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/LES.2021.3119229"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-15717-2"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1145\/2463209.2488873"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC47752.2019.9042036"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.23919\/DATE51398.2021.9474004"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2939265"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-022-03344-3"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2972859"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2022.3217841"},{"key":"ref110","first-page":"1","article-title":"Characterization and prediction of deep learning workloads in large-scale GPU datacenters","volume-title":"Proc. Int. Conf. High Perform. Comput., Netw., Storage Anal.","author":"Hu"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2020.106901"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/TBCAS.2020.2995784"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/AERO.2011.5747449"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.3103\/S0146411615010022"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2008.2003166"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2010.5647798"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.3403\/30320026"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1007\/11596110_3"},{"key":"ref119","volume-title":"Fault-tolerant execution of parallel applications on x86 multi-core processors with hardware transactional memory","author":"Haas","year":"2019"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.221"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1145\/951710.951734"},{"key":"ref122","first-page":"25","article-title":"Transient fault detection via simultaneous multithreading","volume-title":"Proc. 27th Annu. Int. Symp. Comput. Archit.","author":"Reinhardt"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.53"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/TNS.2022.3149867"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2021.3057132"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609960"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1201\/b17805"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655015"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653686"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1145\/1866835.1866843"},{"key":"ref131","volume-title":"Fault Injection Techniques and Tools for Embedded Systems Reliability Evaluation","volume":"23","author":"Benso","year":"2003"},{"key":"ref132","volume-title":"Software Fault Injection: Inoculating Programs Against Errors","author":"Voas","year":"1997"},{"issue":"2","key":"ref133","first-page":"171","article-title":"A survey on fault injection techniques","volume":"1","author":"Ziade","year":"2004","journal-title":"Int. Arab J. Inf. Technol."},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/TNS.2013.2259503"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/2.585157"},{"key":"ref136","volume-title":"Model-based Fault Diagnosis Techniques: Design Schemes, Algorithms, and Tools","author":"Ding","year":"2008"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-04660-6_6"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1145\/2816839.2816917"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1145\/2039370.2039384"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10772080.pdf?arnumber=10772080","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T06:39:56Z","timestamp":1733985596000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10772080\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":139,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3509633","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}