{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:03:09Z","timestamp":1773615789766,"version":"3.50.1"},"reference-count":24,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.3103\/s0146411625700786","type":"journal-article","created":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T12:34:51Z","timestamp":1771936491000},"page":"1260-1269","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Automated Method for Evaluating the Correctness of Distributed Algorithms Using Chaos Engineering Testing"],"prefix":"10.3103","volume":"59","author":[{"given":"A. D.","family":"Dakhnovich","sequence":"first","affiliation":[]},{"given":"A. A.","family":"Lyrchikov","sequence":"additional","affiliation":[]},{"given":"D. A.","family":"Moskvin","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2026,2,24]]},"reference":[{"key":"7913_CR1","doi-asserted-by":"publisher","unstructured":"Schmid, L., Hey, T., Armbruster, M., Corallo, S., Fuch\u00df, D., Keim, J., Liu, H., and Koziolek, A., Software architecture meets LLMs: A systematic literature review, arXiv Preprint, 2025. https:\/\/doi.org\/10.48550\/arXiv.2505.16697","DOI":"10.48550\/arXiv.2505.16697"},{"key":"7913_CR2","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.jss.2019.01.001","volume":"150","author":"P. Di Francesco","year":"2019","unstructured":"Di Francesco, P., Lago, P., and Malavolta, I., Architecting with microservices: A systematic mapping study, J.\u00a0Syst. Software, 2019, vol. 150, pp. 77\u201397. https:\/\/doi.org\/10.1016\/j.jss.2019.01.001","journal-title":"J.\u00a0Syst. Software"},{"key":"7913_CR3","unstructured":"Yuan, D., Luo, Y., Zhuang, X., Rodrigues, G.R., Zhao, X., Zhang, Y., Jain, P.U., and Stumm, M., Simple testing can prevent most critical failures: An analysis of production failures in distributed data-intensive systems, Proceedings of the 11th Symposium on Operating Systems Design and Implementation (OSDI), Broomfield, CO, 2014, New York: Association for Computing Machinery, 2014, pp. 249\u2013365."},{"key":"7913_CR4","doi-asserted-by":"publisher","first-page":"1160","DOI":"10.3103\/s0146411618080023","volume":"52","author":"E.B. Aleksandrova","year":"2018","unstructured":"Aleksandrova, E.B. and Shkorkina, E.N., Using undeniable signature on elliptic curves to verify servers in outsourced computations, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1160\u20131163. https:\/\/doi.org\/10.3103\/s0146411618080023","journal-title":"Autom. Control Comput. Sci."},{"key":"7913_CR5","doi-asserted-by":"publisher","unstructured":"Chaudhuri, K.C., Doligez, D., Lamport, L., and Merz, S., A TLA+ proof system, arXiv Preprint, 2008. https:\/\/doi.org\/10.48550\/arXiv.0811.1914","DOI":"10.48550\/arXiv.0811.1914"},{"key":"7913_CR6","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/2699417","volume":"58","author":"Ch. Newcombe","year":"2015","unstructured":"Newcombe, Ch., Rath, T., Zhang, F., Munteanu, B., Brooker, M., and Deardeuff, M., How Amazon web services uses formal methods, Commun. ACM, 2015, vol. 58, no. 4, pp. 66\u201373. https:\/\/doi.org\/10.1145\/2699417","journal-title":"Commun. ACM"},{"key":"7913_CR7","doi-asserted-by":"publisher","unstructured":"Aleksandrova, E.B., Poltavtseva, M.A., and Shmatov, V.S., Ensuring the big data integrity through verifiable zero-knowledge operations, Mobile Internet Security. MobiSec 2021, You, I., Kim, H., Youn, T.Y., Palmieri, F., and Kotenko, I., Eds., Communications in Computer and Information Science, vol. 1544, Singapore: Springer, 2022, pp. 211\u2013221. https:\/\/doi.org\/10.1007\/978-981-16-9576-6_15","DOI":"10.1007\/978-981-16-9576-6_15"},{"key":"7913_CR8","doi-asserted-by":"publisher","unstructured":"Chang, M.A., Tschaen, B., Benson, T., and Vanbever, L., Chaos monkey: Increasing sdn reliability through systematic network destruction, Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, London, 2015, New York: Association for Computing Machinery, 2015, pp. 371\u2013372. https:\/\/doi.org\/10.1145\/2785956.2790038","DOI":"10.1145\/2785956.2790038"},{"key":"7913_CR9","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/ms.2016.60","volume":"33","author":"A. Basiri","year":"2016","unstructured":"Basiri, A., Behnam, N., de Rooij, R., Hochstein, L., Kosewski, L., Reynolds, J., and Rosenthal, C., Chaos engineering, IEEE Software, 2016, vol. 33, no. 3, pp. 35\u201341. https:\/\/doi.org\/10.1109\/ms.2016.60","journal-title":"IEEE Software"},{"key":"7913_CR10","doi-asserted-by":"publisher","unstructured":"Basiri, A., Hochstein, L., Jones, N., and Tucker, H., Automating chaos experiments in production, 2019 IEEE\/ACM 41st International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP), Montreal, 2019, IEEE, 2019, pp. 31\u201340. https:\/\/doi.org\/10.1109\/icse-seip.2019.00012","DOI":"10.1109\/icse-seip.2019.00012"},{"key":"7913_CR11","doi-asserted-by":"publisher","first-page":"123044","DOI":"10.1109\/access.2020.3007338","volume":"8","author":"K.A. Torkura","year":"2020","unstructured":"Torkura, K.A., Sukmana, M.I.H., Cheng, F., and Meinel, Ch., CloudStrike: Chaos engineering for security and resiliency in cloud infrastructure, IEEE Access, 2020, vol. 8, pp. 123044\u2013123060. https:\/\/doi.org\/10.1109\/access.2020.3007338","journal-title":"IEEE Access"},{"key":"7913_CR12","doi-asserted-by":"publisher","unstructured":"Jernberg, H., Runeson, P., and Engstr\u00f6m, E., Getting started with chaos engineering\u2014Design of an implementation framework in practice, Proceedings of the 14th ACM \/ IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM), Bari, Italy, 2020, New York: Association for Computing Machinery, 2020, p. 43. https:\/\/doi.org\/10.1145\/3382494.3421464","DOI":"10.1145\/3382494.3421464"},{"key":"7913_CR13","doi-asserted-by":"publisher","first-page":"2695","DOI":"10.1109\/tdsc.2021.3069715","volume":"19","author":"L. Zhang","year":"2022","unstructured":"Zhang, L., Morin, B., Baudry, B., and Monperrus, M., Maximizing error injection realism for chaos engineering with system calls, IEEE Trans. Dependable Secure Comput., 2022, vol. 19, no. 4, pp. 2695\u20132708. https:\/\/doi.org\/10.1109\/tdsc.2021.3069715","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"7913_CR14","unstructured":"Lewis, J. and Wang, C., Chaos engineering: New approaches to security, A Rain Capital Research Note, 2019."},{"key":"7913_CR15","doi-asserted-by":"publisher","first-page":"117530a","DOI":"10.1117\/12.2584986","volume":"11753","author":"A. Pierce","year":"2021","unstructured":"Pierce, A., Schanck, J., Groeger, A., Salih, R., and Clark, M.R., Chaos engineering experiments in middleware systems using targeted network degradation and automatic fault injection, Proc. SPIE, 2021, vol. 11753, p. 117530a. https:\/\/doi.org\/10.1117\/12.2584986","journal-title":"Proc. SPIE"},{"key":"7913_CR16","doi-asserted-by":"publisher","unstructured":"De, S., A study on chaos engineering for improving cloud software quality and reliability, 2021 International Conference on Disruptive Technologies for Multi-Disciplinary Research and Applications (CENTCON), Bengaluru, India, 2021, IEEE, 2021, pp. 289\u2013294. https:\/\/doi.org\/10.1109\/centcon52345.2021.9688292","DOI":"10.1109\/centcon52345.2021.9688292"},{"key":"7913_CR17","unstructured":"Find and fix your reliability risks. https:\/\/www.gremlin.com\/. Cited May 20, 2024."},{"key":"7913_CR18","unstructured":"Break your system constructively. https:\/\/chaos-mesh.org\/. Cited May 20, 2024."},{"key":"7913_CR19","unstructured":"Distributed systems safety research. https:\/\/jepsen.io\/. Cited May 20, 2024."},{"key":"7913_CR20","doi-asserted-by":"publisher","unstructured":"Meng, R., P\u00eerlea, G., Roychoudhury, A., and Sergey, I., Greybox fuzzing of distributed systems, Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, Copenhagen, 2023, New York: Association for Computing Machinery, 2023, pp. 1615\u20131629. https:\/\/doi.org\/10.1145\/3576915.3623097","DOI":"10.1145\/3576915.3623097"},{"key":"7913_CR21","doi-asserted-by":"publisher","unstructured":"Yuan, X. and Yang, J., Effective concurrency testing for distributed systems, Proceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Systems, Lausanne, 2020, New York: Association for Computing Machinery, 2020, pp. 1141\u20131156. https:\/\/doi.org\/10.1145\/3373376.3378484","DOI":"10.1145\/3373376.3378484"},{"key":"7913_CR22","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.cl.2016.01.004","volume":"45","author":"A. Jafari","year":"2016","unstructured":"Jafari, A., Khamespanah, E., Kristinsson, H., Sirjani, M., and Magnusson, B., Statistical model checking of Timed Rebeca models, Computer Languages, Systems & Structures, 2016, vol. 45, pp. 53\u201379. https:\/\/doi.org\/10.1016\/j.cl.2016.01.004","journal-title":"Computer Languages, Systems & Structures"},{"key":"7913_CR23","unstructured":"Yang, J. et al., MODIST: Transparent model checking of unmodified distributed systems, NSDI\u201909: 6th USENIX Symposium on Networked Systems Design and Implementation, 2009, pp. 213\u2013228."},{"key":"7913_CR24","doi-asserted-by":"publisher","unstructured":"Lukman, J.F. et al., Flymc: Highly scalable testing of complex interleavings in distributed systems, Proceedings of the Fourteenth EuroSys Conference, 2019, pp. 1\u201316. https:\/\/doi.org\/10.1145\/3302424.3303986","DOI":"10.1145\/3302424.3303986"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625700786.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411625700786","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625700786.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:04:38Z","timestamp":1773612278000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411625700786"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":24,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["7913"],"URL":"https:\/\/doi.org\/10.3103\/s0146411625700786","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12]]},"assertion":[{"value":"12 June 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 July 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 July 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}