{"id":"https://openalex.org/W4416199150","doi":"https://doi.org/10.1145/3712285.3759822","title":"Deploying Lightweight Input-Aware Selective Instruction Duplication in HPC Applications","display_name":"Deploying Lightweight Input-Aware Selective Instruction Duplication in HPC Applications","publication_year":2025,"publication_date":"2025-11-12","ids":{"openalex":"https://openalex.org/W4416199150","doi":"https://doi.org/10.1145/3712285.3759822"},"language":null,"primary_location":{"id":"doi:10.1145/3712285.3759822","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3712285.3759822","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101841503","display_name":"Md Hasanur Rahman","orcid":"https://orcid.org/0009-0002-5540-8751"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Md Hasanur Rahman","raw_affiliation_strings":["University of Florida, Gainesville, USA"],"affiliations":[{"raw_affiliation_string":"University of Florida, Gainesville, USA","institution_ids":["https://openalex.org/I33213144"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025726299","display_name":"Guanpeng Li","orcid":"https://orcid.org/0000-0001-7773-7826"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Guanpeng Li","raw_affiliation_strings":["University of Florida, Gainesville, USA"],"affiliations":[{"raw_affiliation_string":"University of Florida, Gainesville, USA","institution_ids":["https://openalex.org/I33213144"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101841503"],"corresponding_institution_ids":["https://openalex.org/I33213144"],"apc_list":null,"apc_paid":null,"fwci":2.8331,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.93071242,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1099","last_page":"1112"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9451000094413757,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9451000094413757,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11005","display_name":"Radiation Effects in Electronics","score":0.0340999998152256,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.00559999980032444,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6194000244140625},{"id":"https://openalex.org/keywords/data-loss","display_name":"Data loss","score":0.3560999929904938},{"id":"https://openalex.org/keywords/transient","display_name":"Transient (computer programming)","score":0.3479999899864197},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.320499986410141},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.29010000824928284}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7864000201225281},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6194000244140625},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.44290000200271606},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3781999945640564},{"id":"https://openalex.org/C193519340","wikidata":"https://www.wikidata.org/wiki/Q891179","display_name":"Data loss","level":2,"score":0.3560999929904938},{"id":"https://openalex.org/C2780799671","wikidata":"https://www.wikidata.org/wiki/Q17087362","display_name":"Transient (computer programming)","level":2,"score":0.3479999899864197},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.320499986410141},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.30079999566078186},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.29010000824928284},{"id":"https://openalex.org/C118524514","wikidata":"https://www.wikidata.org/wiki/Q173212","display_name":"Computer architecture","level":1,"score":0.2736000120639801},{"id":"https://openalex.org/C32587265","wikidata":"https://www.wikidata.org/wiki/Q1182260","display_name":"Data deduplication","level":2,"score":0.25600001215934753},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.2526000142097473},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.25060001015663147}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3712285.3759822","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3712285.3759822","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W1793727233","https://openalex.org/W1965936844","https://openalex.org/W2013280342","https://openalex.org/W2021337678","https://openalex.org/W2026441832","https://openalex.org/W2034593585","https://openalex.org/W2060322444","https://openalex.org/W2086240295","https://openalex.org/W2094446102","https://openalex.org/W2108557605","https://openalex.org/W2120185818","https://openalex.org/W2130189691","https://openalex.org/W2147629627","https://openalex.org/W2150267144","https://openalex.org/W2152365194","https://openalex.org/W2169596872","https://openalex.org/W2292932312","https://openalex.org/W2535617737","https://openalex.org/W2751243270","https://openalex.org/W2767966988","https://openalex.org/W2883506058","https://openalex.org/W2891235722","https://openalex.org/W2926761828","https://openalex.org/W3006243271","https://openalex.org/W3012032150","https://openalex.org/W3031001329","https://openalex.org/W3125721406","https://openalex.org/W3129298663","https://openalex.org/W3171842021","https://openalex.org/W3208260792","https://openalex.org/W4237357144","https://openalex.org/W4244241786","https://openalex.org/W4253391807","https://openalex.org/W4255519882","https://openalex.org/W4312694612","https://openalex.org/W4318969201","https://openalex.org/W4391424871","https://openalex.org/W4400410938"],"related_works":[],"abstract_inverted_index":{"Modern":[0],"high-performance":[1],"computing":[2],"(HPC)":[3],"applications":[4,127],"are":[5],"increasingly":[6],"vulnerable":[7],"to":[8,60,81,91,114,144],"silent":[9],"data":[10],"corruptions":[11],"(SDCs)":[12],"caused":[13],"by":[14],"transient":[15],"hardware":[16],"faults.":[17],"While":[18],"selective":[19],"instruction":[20],"duplication":[21],"(SID)":[22],"offers":[23],"an":[24],"efficient":[25],"software-level":[26],"protection":[27,75,80,102],"strategy,":[28],"existing":[29,145],"SID":[30,74,101,120,146],"methods":[31],"rely":[32],"on":[33],"SDC":[34,56,62,137],"vulnerability":[35],"profile":[36],"derived":[37,110],"from":[38,111],"only":[39],"the":[40,52,118,129],"default":[41],"reference":[42],"input":[43,89,97,112],"often":[44],"found":[45],"in":[46,135],"application":[47],"suites.":[48],"However,":[49],"they":[50],"overlook":[51],"input-dependent":[53],"nature":[54],"of":[55,96,133],"propagation.":[57],"This":[58],"leads":[59],"significant":[61],"coverage":[63,138],"loss":[64,139],"when":[65],"inputs":[66],"vary.":[67],"We":[68],"present":[69],"Protego,":[70],"a":[71,86,93],"novel":[72],"input-aware":[73],"framework":[76],"that":[77],"efficiently":[78],"adapts":[79],"runtime":[82],"inputs.":[83],"Protego":[84,106,134],"performs":[85],"one-time":[87],"vulnerability-guided":[88],"exploration":[90],"identify":[92],"small":[94],"number":[95],"groups":[98],"with":[99],"distinct":[100],"patterns.":[103],"At":[104],"runtime,":[105],"uses":[107],"lightweight":[108],"features":[109],"arguments":[113],"select":[115],"and":[116,131],"deploy":[117],"appropriate":[119],"protection.":[121],"Our":[122],"evaluation":[123],"across":[124,140],"10":[125],"HPC":[126],"demonstrates":[128],"effectiveness":[130],"efficiency":[132],"mitigating":[136],"diverse":[141],"inputs,":[142],"compared":[143],"techniques.":[147]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-11-12T00:00:00"}
