{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T02:44:49Z","timestamp":1730342689181,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.23919\/date.2017.7927234","type":"proceedings-article","created":{"date-parts":[[2017,5,15]],"date-time":"2017-05-15T16:34:41Z","timestamp":1494866081000},"page":"1534-1539","source":"Crossref","is-referenced-by-count":6,"title":["Characterization of stack behavior under soft errors"],"prefix":"10.23919","author":[{"given":"Junchi","family":"Ma","sequence":"first","affiliation":[]},{"given":"Yun","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2013.6575353"},{"key":"ref11","article-title":"Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks","author":"cowan","year":"1998","journal-title":"USENIX Security Symposium"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2012.6263923"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/PACT.2003.1238002"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2150976.2150990"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2012.6263960"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2008.4630119"},{"key":"ref17","first-page":"459","article-title":"Characterization of linux kernel behavior under errors","author":"gu","year":"2003","journal-title":"Dependable Systems and Networks (DSN)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2656106.2656127"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2015.0367"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2005.34"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/24.994913"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1064978.1065034"},{"volume":"1","journal-title":"Intel The IA-32 Intel Architecture Software Developer's Manual","year":"2006","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2426179"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2013.6575354"},{"key":"ref9","first-page":"191","article-title":"Experiments of the effectiveness of dataflow- and controlflow-based test adequacy criteria","author":"hutchins","year":"1994","journal-title":"International Conference on Software Engineering (ICSE) IEEE Computer Society Press"}],"event":{"name":"2017 Design, Automation & Test in Europe Conference & Exhibition (DATE)","start":{"date-parts":[[2017,3,27]]},"location":"Lausanne, Switzerland","end":{"date-parts":[[2017,3,31]]}},"container-title":["Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE), 2017"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7919927\/7926947\/07927234.pdf?arnumber=7927234","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,5,31]],"date-time":"2017-05-31T00:21:18Z","timestamp":1496190078000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7927234\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3]]},"references-count":17,"URL":"https:\/\/doi.org\/10.23919\/date.2017.7927234","relation":{},"subject":[],"published":{"date-parts":[[2017,3]]}}}