{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T09:57:59Z","timestamp":1764842279105,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1109\/iolts.2019.8854397","type":"proceedings-article","created":{"date-parts":[[2019,10,4]],"date-time":"2019-10-04T00:27:48Z","timestamp":1570148868000},"page":"176-181","source":"Crossref","is-referenced-by-count":6,"title":["A Vulnerability Factor for ECC-protected Memory"],"prefix":"10.1109","author":[{"given":"Luc","family":"Jaulmes","sequence":"first","affiliation":[]},{"given":"Miquel","family":"Moreto","sequence":"additional","affiliation":[]},{"given":"Mateo","family":"Valero","sequence":"additional","affiliation":[]},{"given":"Marc","family":"Casas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2018.00056"},{"journal-title":"Intel&#x00AE;R 64 and IA-32 Architectures Software Developer Manual Vol 3 System Programming Guide","first-page":"325384","year":"2017","key":"ref11"},{"journal-title":"Exploiting Asynchrony from Exact Forward Recovery for DUE &#x201D; in SC&#x2019;15","year":"2015","author":"jaulmes","key":"ref12"},{"key":"ref13","article-title":"Co-Architecting Controllers and DRAM to Enhance DRAM Process Scaling","author":"kang","year":"2014","journal-title":"The Memory Forum"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2015.2414456"},{"key":"ref15","first-page":"1591","article-title":"mcelog","author":"kleen","year":"0","journal-title":"Linux-Kongress"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2018.00046"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.15"},{"key":"ref18","article-title":"Characterizing Application Memory Error Vulnerability","author":"luo","year":"2014","journal-title":"DSN"},{"key":"ref19","first-page":"19","article-title":"Memory Bandwidth and Machine Balance in Current HPC","author":"mccalpin","year":"1995","journal-title":"IEEE Comp Soc TCCA Newsletter"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2014.62"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1375527.1375552"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736064"},{"journal-title":"ARM Cortex-A55 Core","year":"2017","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1120725.1121000"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2304576.2304590"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1142\/S0129626411000151"},{"key":"ref7","article-title":"A White Paper on the Benefits of Chipkill-Correct ECC for PC Server Main Memory","author":"dell","year":"1997","journal-title":"IBM Microelectronics white paper"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1654059.1654102"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2014.123"},{"journal-title":"AMD64 Architecture Programmer&#x2019;s Manual Vol 2 System Programming","year":"2018","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1455650.1455653"},{"key":"ref22","article-title":"A Systematic Methodology to Compute the Architectural Vulnerability Factors","author":"mukherjee","year":"2003","journal-title":"MICRO 36"},{"journal-title":"ECC Brings Reliability and Power Efficiency to Mobile Devices","year":"2017","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2086696.2086715"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2011.5762718"},{"key":"ref26","article-title":"Calculating AVF for Spatial Multi-Bit Transient Faults","volume":"47","author":"wilkening","year":"2014","journal-title":"Micro"},{"key":"ref25","article-title":"The Parallel Research Kernels","author":"wijngaart","year":"2014","journal-title":"HPEC"}],"event":{"name":"2019 IEEE 25th International Symposium on On-Line Testing And Robust System Design (IOLTS)","start":{"date-parts":[[2019,7,1]]},"location":"Rhodes, Greece","end":{"date-parts":[[2019,7,3]]}},"container-title":["2019 IEEE 25th International Symposium on On-Line Testing and Robust System Design (IOLTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8846168\/8854369\/08854397.pdf?arnumber=8854397","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T21:50:51Z","timestamp":1658094651000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8854397\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/iolts.2019.8854397","relation":{},"subject":[],"published":{"date-parts":[[2019,7]]}}}