{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T07:00:58Z","timestamp":1772866858967,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":60,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T00:00:00Z","timestamp":1636761600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11,14]]},"DOI":"10.1145\/3458817.3476147","type":"proceedings-article","created":{"date-parts":[[2021,11,24]],"date-time":"2021-11-24T14:42:14Z","timestamp":1637764934000},"page":"1-13","source":"Crossref","is-referenced-by-count":14,"title":["PEPPA-X"],"prefix":"10.1145","author":[{"given":"Md Hasanur","family":"Rahman","sequence":"first","affiliation":[{"name":"University of Iowa"}]},{"given":"Aabid","family":"Shamji","sequence":"additional","affiliation":[{"name":"University of Iowa"}]},{"given":"Shengjian","family":"Guo","sequence":"additional","affiliation":[{"name":"Baidu Security"}]},{"given":"Guanpeng","family":"Li","sequence":"additional","affiliation":[{"name":"University of Iowa"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SC41405.2020.00092"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00117"},{"key":"e_1_3_2_1_3_1","first-page":"72","volume-title":"Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis","author":"Ashraf Rizwan A"},{"key":"e_1_3_2_1_4_1","volume-title":"Near-zero downtime recovery from transient-error-induced crashes. arXiv preprint arXiv:2103.05185","author":"Chen Chao","year":"2021"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3208040.3208043"},{"key":"e_1_3_2_1_6_1","first-page":"2325","volume-title":"29th USENIX Security Symposium, USENIX Security 2020","author":"Chen Hongxu","year":"2020"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243849"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00002"},{"key":"e_1_3_2_1_9_1","first-page":"101","volume-title":"Proceedings of the 50th Annual Design Automation Conference","author":"Cho Hyungmin"},{"key":"e_1_3_2_1_10_1","first-page":"370","volume-title":"Reliability and Maintainability Symposium","author":"Constantinescu Cristian"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2008.4630119"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.142682"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33678-2_17"},{"key":"e_1_3_2_1_14_1","volume-title":"Silent data corruptions at scale. arXiv preprint arXiv:2102.11245","author":"Dixit Harish Dattatraya","year":"2021"},{"key":"e_1_3_2_1_15_1","first-page":"385","volume-title":"ACM SIGARCH Computer Architecture News","author":"Feng Shuguang"},{"key":"e_1_3_2_1_16_1","volume-title":"Citeseer","author":"Folkesson Peter","year":"1999"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3126908.3126972"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2018.00016"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2019.00096"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2021.02.015"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2018.00011"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2012.6263960"},{"key":"e_1_3_2_1_23_1","first-page":"123","volume-title":"ACM SIGARCH Computer Architecture News","author":"Sastry Hari Siva Kumar"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/APS.2000.875398"},{"key":"e_1_3_2_1_25_1","unstructured":"https:\/\/github.com\/google\/AFL. american fuzzy lop.  https:\/\/github.com\/google\/AFL. american fuzzy lop."},{"key":"e_1_3_2_1_26_1","unstructured":"https:\/\/google.github.io\/clusterfuzz\/. clusterfuzz.  https:\/\/google.github.io\/clusterfuzz\/. clusterfuzz."},{"key":"e_1_3_2_1_27_1","unstructured":"https:\/\/llvm.org\/docs\/LibFuzzer.html. libfuzzer.  https:\/\/llvm.org\/docs\/LibFuzzer.html. libfuzzer."},{"key":"e_1_3_2_1_28_1","volume-title":"Armorall: Compiler-based resilience targeting gpu applications. ACM Transactions on Architecture and Code Optimization (TACO), 17(2):1--24","author":"Kalra Charu","year":"2020"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2854038.2854059"},{"key":"e_1_3_2_1_30_1","first-page":"75","volume-title":"International Symposium on Code Generation and Optimization","author":"Lattner Chris"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2503210.2503226"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2018.00038"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2016.20"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTER49012.2020.00043"},{"key":"e_1_3_2_1_35_1","first-page":"533","volume-title":"Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, ESEC\/SIGSOFT FSE 2019","author":"Li Yuekang","year":"2019"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3437801.3441589"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.2172\/1222713"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304050"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1112\/plms\/s1-28.1.486"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3200691.3178502"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2018.00022"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00066"},{"key":"e_1_3_2_1_43_1","first-page":"176","volume-title":"Proceedings of the 41st International Conference on Software Engineering, ICSE 2019, Montreal, QC, Canada, May 25--31, 2019","author":"Nilizadeh Shirin","year":"2019"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/24.994926"},{"key":"e_1_3_2_1_45_1","first-page":"1481","volume-title":"29th USENIX Security Symposium, USENIX Security 2020","author":"Oleksenko Oleksii","year":"2020"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2019.00024"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.30"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297663.3310291"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1177\/1094342014522573"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236039"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.2"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380396"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2020.2980541"},{"key":"e_1_3_2_1_54_1","volume-title":"Enabling software resilience in gpgpu applications via partial thread protection. arXiv preprint arXiv:2103.02825","author":"Yang Lishan","year":"2021"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3473578"},{"key":"e_1_3_2_1_56_1","first-page":"287","volume-title":"International Parallel & Distributed Processing Symposium (IPDPS)","author":"Yim Keun Soo"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2014.62"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23525"},{"issue":"07","key":"e_1_3_2_1_59_1","first-page":"1677","article-title":"Algorithm-based fault tolerance for convolutional neural networks","volume":"32","author":"Zhao Kai","year":"2021","journal-title":"IEEE Transactions on Parallel & Distributed Systems"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417260"}],"event":{"name":"SC '21: The International Conference for High Performance Computing, Networking, Storage and Analysis","location":"St. Louis Missouri","acronym":"SC '21","sponsor":["SIGHPC ACM Special Interest Group on High Performance Computing, Special Interest Group on High Performance Computing","IEEE CS"]},"container-title":["Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3458817.3476147","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3458817.3476147","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:06Z","timestamp":1750268946000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3458817.3476147"}},"subtitle":["finding program test inputs to bound silent data corruption vulnerability in HPC applications"],"short-title":[],"issued":{"date-parts":[[2021,11,13]]},"references-count":60,"alternative-id":["10.1145\/3458817.3476147","10.1145\/3458817"],"URL":"https:\/\/doi.org\/10.1145\/3458817.3476147","relation":{},"subject":[],"published":{"date-parts":[[2021,11,13]]}}}