{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:58:39Z","timestamp":1773248319314,"version":"3.50.1"},"reference-count":36,"publisher":"Association for Computing Machinery (ACM)","issue":"5","license":[{"start":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T00:00:00Z","timestamp":1725408000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Des. Autom. Electron. Syst."],"published-print":{"date-parts":[[2024,9,30]]},"abstract":"<jats:p>\n            Software-Implemented Hardware Fault Tolerance (SIHFT) is a modern approach for tackling random hardware faults of dependable systems employing solely software solutions. This work extends an automatic compiler-based SIHFT hardening tool called ASPIS, enhancing it with novel protection mechanisms and overhead-reduction techniques, also providing an extensive analysis of its compliance with the non-trivial workload of the open-source Real-Time Operating System FreeRTOS. A thorough experimental fault-injection campaign on an STM32 board shows how the system achieves remarkably high tolerance to single-event upsets and a comparison between the SIHFT mechanisms implemented summarises the tradeoff between the overhead introduced and the detection capabilities of the various solutions.\n            <jats:xref ref-type=\"fn\">\n              <jats:sup\/>\n            <\/jats:xref>\n          <\/jats:p>\n          <jats:p\/>","DOI":"10.1145\/3660524","type":"journal-article","created":{"date-parts":[[2024,4,22]],"date-time":"2024-04-22T10:53:30Z","timestamp":1713783210000},"page":"1-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Enhanced Compiler Technology for Software-based Hardware Fault Detection"],"prefix":"10.1145","volume":"29","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-3112-9869","authenticated-orcid":false,"given":"Davide","family":"Baroffio","sequence":"first","affiliation":[{"name":"Politecnico di Milano, Milano, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1888-9579","authenticated-orcid":false,"given":"Federico","family":"Reghenzani","sequence":"additional","affiliation":[{"name":"Politecnico di Milano, Milano, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8294-730X","authenticated-orcid":false,"given":"William","family":"Fornaciari","sequence":"additional","affiliation":[{"name":"Politecnico di Milano, Milano, Italy"}]}],"member":"320","published-online":{"date-parts":[[2024,9,4]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102165"},{"key":"e_1_3_2_3_2","first-page":"637","article-title":"An optimum instruction level method for soft error detection","volume":"7","author":"Abdi Athena","year":"2012","unstructured":"Athena Abdi, Seyyed Amir Asghari, Saadat Mozaffari, Hassan Taheri, and Hossein Pedram. 2012. An optimum instruction level method for soft error detection. International Review on Computers and Software 7, 2 (2012), 637\u2013641.","journal-title":"International Review on Computers and Software"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2015.09.020"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","unstructured":"Davide Baroffio and Federico Reghenzani. 2023. Compiler-injected SIHFT for embedded operating systems.InProceedings of the 20th ACM International Conference on Computing Frontiers. Association for Computing Machinery New York NY USA 337\u2013343. DOI:DOI:10.1145\/3587135.3589944","DOI":"10.1145\/3587135.3589944"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2005.69"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNS.2018.2886094"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2005.110"},{"key":"e_1_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2898054"},{"key":"e_1_3_2_10_2","first-page":"2:1\u20132:10","volume-title":"Proceedings of the 16th International Workshop on Worst-Case Execution Time Analysis.","author":"Falk Heiko","year":"2016","unstructured":"Heiko Falk, Sebastian Altmeyer, Peter Hellinckx, Bj\u00f6rn Lisper, Wolfgang Puffitsch, Christine Rochange, Martin Schoeberl, Rasmus Bo S\u00f8rensen, Peter W\u00e4gemann, and Simon Wegener. 2016. TACLeBench: A benchmark collection to support worst-case execution time research. In Proceedings of the 16th International Workshop on Worst-Case Execution Time Analysis.Martin Schoeberl (Ed.), Schloss Dagstuhl\u2013Leibniz-Zentrum f\u00fcr Informatik, Dagstuhl, Germany, 2:1\u20132:10."},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736063"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-46077-7_26"},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/3566097.3567925"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.5555\/1208364"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.4230\/OASIcs.WCET.2010.136"},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/WWC.2001.990739"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.23919\/DATE51398.2021.9474205"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/2345141.2248433"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","unstructured":"John C. Knight. 2002. Safety critical systems: Challenges and directions.InProceedings of the 24th International Conference on Software Engineering. Association for Computing Machinery New York NY USA 547\u2013550. DOI:DOI:10.1145\/581339.581406","DOI":"10.1145\/581339.581406"},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2009.5090716"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/DFT50435.2020.9250861"},{"key":"e_1_3_2_22_2","volume-title":"Proceedings of the 2001 International Symposium on Dependable Systems and Networks","author":"Oh Nahmsuk","year":"2001","unstructured":"Nahmsuk Oh and Edward J. McCluskey. 2001. Low energy error detection technique using procedure call duplication. In Proceedings of the 2001 International Symposium on Dependable Systems and Networks."},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/24.994926"},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/24.994913"},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/3587135.3592765"},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS54340.2022.00011"},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2005.34"},{"key":"e_1_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/3301311"},{"key":"e_1_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.188"},{"key":"e_1_3_2_30_2","volume-title":"Space Product Assurance - Techniques for Radiation Effects Mitigation in ASICs and FPGAs Handbook (ECSS-Q-HB-60-02A ed.)","author":"Secretariat ECSS","year":"2016","unstructured":"ECSS Secretariat. 2016. Space Product Assurance - Techniques for Radiation Effects Mitigation in ASICs and FPGAs Handbook (ECSS-Q-HB-60-02A ed.). European Space Agency, Noordwijk, The Netherlands."},{"key":"e_1_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/MECO55406.2022.9797144"},{"key":"e_1_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSRS48664.2019.8987731"},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2017.2754548"},{"key":"e_1_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99130-6_15"},{"key":"e_1_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/23.340567"},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.101"},{"key":"e_1_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1145\/3372799.3394360"}],"container-title":["ACM Transactions on Design Automation of Electronic Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3660524","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3660524","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:03:59Z","timestamp":1750291439000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3660524"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,4]]},"references-count":36,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,9,30]]}},"alternative-id":["10.1145\/3660524"],"URL":"https:\/\/doi.org\/10.1145\/3660524","relation":{},"ISSN":["1084-4309","1557-7309"],"issn-type":[{"value":"1084-4309","type":"print"},{"value":"1557-7309","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9,4]]},"assertion":[{"value":"2023-11-30","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-04-13","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-09-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}