{"id":"https://openalex.org/W7117460668","doi":"https://doi.org/10.1145/3742875.3754691","title":"Formal Analysis of Fault Propagation in Complex Digital Systems","display_name":"Formal Analysis of Fault Propagation in Complex Digital Systems","publication_year":2025,"publication_date":"2025-09-28","ids":{"openalex":"https://openalex.org/W7117460668","doi":"https://doi.org/10.1145/3742875.3754691"},"language":null,"primary_location":{"id":"doi:10.1145/3742875.3754691","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3742875.3754691","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Symposium on Formal Methods and Models for System Design","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5092762680","display_name":"Damiano Zuccal\u00e0","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Damiano Zuccala","raw_affiliation_strings":[],"raw_orcid":"https://orcid.org/0009-0009-3329-5347","affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5094461731","display_name":"Hon Samuel","orcid":null},"institutions":[{"id":"https://openalex.org/I4210104693","display_name":"STMicroelectronics (France)","ror":"https://ror.org/01c74sd89","country_code":"FR","type":"company","lineage":["https://openalex.org/I131827901","https://openalex.org/I4210104693"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Samuel Hon","raw_affiliation_strings":["STMicroelectronics, Crolles, France"],"raw_orcid":"https://orcid.org/0009-0006-6073-127X","affiliations":[{"raw_affiliation_string":"STMicroelectronics, Crolles, France","institution_ids":["https://openalex.org/I4210104693"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5118753856","display_name":"Mohammad Reza Heidari Iman","orcid":null},"institutions":[{"id":"https://openalex.org/I899635006","display_name":"Universit\u00e9 Grenoble Alpes","ror":"https://ror.org/02rx3b187","country_code":"FR","type":"education","lineage":["https://openalex.org/I899635006"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Mohammad Reza Heidari Iman","raw_affiliation_strings":["University Grenoble Alpes, Grenoble, France"],"raw_orcid":"https://orcid.org/0009-0002-2384-9210","affiliations":[{"raw_affiliation_string":"University Grenoble Alpes, Grenoble, France","institution_ids":["https://openalex.org/I899635006"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113426457","display_name":"Jean-Marc Daveau","orcid":null},"institutions":[{"id":"https://openalex.org/I4210104693","display_name":"STMicroelectronics (France)","ror":"https://ror.org/01c74sd89","country_code":"FR","type":"company","lineage":["https://openalex.org/I131827901","https://openalex.org/I4210104693"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Jean-Marc Daveau","raw_affiliation_strings":["STMicroelectronics, Crolles, France"],"raw_orcid":"https://orcid.org/0009-0003-1408-3601","affiliations":[{"raw_affiliation_string":"STMicroelectronics, Crolles, France","institution_ids":["https://openalex.org/I4210104693"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121499580","display_name":"Philippe Roche","orcid":null},"institutions":[{"id":"https://openalex.org/I4210104693","display_name":"STMicroelectronics (France)","ror":"https://ror.org/01c74sd89","country_code":"FR","type":"company","lineage":["https://openalex.org/I131827901","https://openalex.org/I4210104693"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Philippe Roche","raw_affiliation_strings":["STMicroelectronics, Crolles, France"],"raw_orcid":"https://orcid.org/0009-0003-8024-7280","affiliations":[{"raw_affiliation_string":"STMicroelectronics, Crolles, France","institution_ids":["https://openalex.org/I4210104693"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067330751","display_name":"Katell Morin-Allory","orcid":null},"institutions":[{"id":"https://openalex.org/I106785703","display_name":"Institut polytechnique de Grenoble","ror":"https://ror.org/05sbt2524","country_code":"FR","type":"education","lineage":["https://openalex.org/I106785703","https://openalex.org/I899635006"]},{"id":"https://openalex.org/I899635006","display_name":"Universit\u00e9 Grenoble Alpes","ror":"https://ror.org/02rx3b187","country_code":"FR","type":"education","lineage":["https://openalex.org/I899635006"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Katell Morin-Allory","raw_affiliation_strings":["Grenoble INP, University Grenoble Alpes, Grenoble, France","University Grenoble Alpes, Grenoble, France"],"raw_orcid":"https://orcid.org/0000-0002-9574-7750","affiliations":[{"raw_affiliation_string":"Grenoble INP, University Grenoble Alpes, Grenoble, France","institution_ids":["https://openalex.org/I899635006","https://openalex.org/I106785703"]},{"raw_affiliation_string":"University Grenoble Alpes, Grenoble, France","institution_ids":["https://openalex.org/I899635006"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5092762680"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.55834227,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"67","last_page":"71"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11005","display_name":"Radiation Effects in Electronics","score":0.8001000285148621,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11005","display_name":"Radiation Effects in Electronics","score":0.8001000285148621,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.05310000106692314,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.03750000149011612,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5625},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5547999739646912},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.545799970626831},{"id":"https://openalex.org/keywords/fault-injection","display_name":"Fault injection","score":0.5357999801635742},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5139999985694885},{"id":"https://openalex.org/keywords/model-checking","display_name":"Model checking","score":0.49889999628067017},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.4738999903202057},{"id":"https://openalex.org/keywords/fault-model","display_name":"Fault model","score":0.4699999988079071},{"id":"https://openalex.org/keywords/formal-methods","display_name":"Formal methods","score":0.4627000093460083},{"id":"https://openalex.org/keywords/fault","display_name":"Fault (geology)","score":0.4481000006198883}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7343000173568726},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5625},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5547999739646912},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.5490999817848206},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.545799970626831},{"id":"https://openalex.org/C2775928411","wikidata":"https://www.wikidata.org/wiki/Q2041312","display_name":"Fault injection","level":3,"score":0.5357999801635742},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5139999985694885},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.49889999628067017},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.4738999903202057},{"id":"https://openalex.org/C167391956","wikidata":"https://www.wikidata.org/wiki/Q1401211","display_name":"Fault model","level":3,"score":0.4699999988079071},{"id":"https://openalex.org/C75606506","wikidata":"https://www.wikidata.org/wiki/Q1049183","display_name":"Formal methods","level":2,"score":0.4627000093460083},{"id":"https://openalex.org/C175551986","wikidata":"https://www.wikidata.org/wiki/Q47089","display_name":"Fault (geology)","level":2,"score":0.4481000006198883},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4458000063896179},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.4392000138759613},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.4307999908924103},{"id":"https://openalex.org/C50712370","wikidata":"https://www.wikidata.org/wiki/Q4269346","display_name":"Software fault tolerance","level":3,"score":0.3952000141143799},{"id":"https://openalex.org/C126953365","wikidata":"https://www.wikidata.org/wiki/Q5438152","display_name":"Fault coverage","level":3,"score":0.3921000063419342},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.3815999925136566},{"id":"https://openalex.org/C152745839","wikidata":"https://www.wikidata.org/wiki/Q5438153","display_name":"Fault detection and isolation","level":3,"score":0.3776000142097473},{"id":"https://openalex.org/C13625343","wikidata":"https://www.wikidata.org/wiki/Q7627418","display_name":"Stuck-at fault","level":4,"score":0.3723999857902527},{"id":"https://openalex.org/C116253237","wikidata":"https://www.wikidata.org/wiki/Q1437424","display_name":"Formal specification","level":2,"score":0.34950000047683716},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3440000116825104},{"id":"https://openalex.org/C66283442","wikidata":"https://www.wikidata.org/wiki/Q1389268","display_name":"Failure mode and effects analysis","level":2,"score":0.33809998631477356},{"id":"https://openalex.org/C2781238097","wikidata":"https://www.wikidata.org/wiki/Q175026","display_name":"Object (grammar)","level":2,"score":0.3257000148296356},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3206999897956848},{"id":"https://openalex.org/C73752529","wikidata":"https://www.wikidata.org/wiki/Q79872","display_name":"Object-oriented programming","level":2,"score":0.3190999925136566},{"id":"https://openalex.org/C72434380","wikidata":"https://www.wikidata.org/wiki/Q230930","display_name":"State space","level":2,"score":0.31769999861717224},{"id":"https://openalex.org/C47822265","wikidata":"https://www.wikidata.org/wiki/Q854457","display_name":"Complex system","level":2,"score":0.31040000915527344},{"id":"https://openalex.org/C48677424","wikidata":"https://www.wikidata.org/wiki/Q6888088","display_name":"Mode (computer interface)","level":2,"score":0.30730000138282776},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.29899999499320984},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.29330000281333923},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.28780001401901245},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2777000069618225},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2732999920845032},{"id":"https://openalex.org/C25343380","wikidata":"https://www.wikidata.org/wiki/Q277521","display_name":"Relation (database)","level":2,"score":0.25270000100135803},{"id":"https://openalex.org/C164155591","wikidata":"https://www.wikidata.org/wiki/Q2067766","display_name":"Satisfiability modulo theories","level":2,"score":0.25049999356269836}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3742875.3754691","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3742875.3754691","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Symposium on Formal Methods and Models for System Design","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W3169847557","https://openalex.org/W4255407876","https://openalex.org/W4386474821","https://openalex.org/W4400062274","https://openalex.org/W4404101817"],"related_works":[],"abstract_inverted_index":{"With":[0],"the":[1,8,16,31,37,52,63,79,83,88],"increasing":[2],"availability":[3],"of":[4,18,33,129],"computational":[5],"resources":[6],"and":[7,69,82,104,133],"progress":[9],"in":[10,26,47,136],"research":[11],"concerning":[12],"automated":[13],"formal":[14,34,130],"methods,":[15],"characterization":[17],"safety":[19],"features":[20],"for":[21,100,125],"hardware":[22,123],"requires":[23],"improved":[24],"precision":[25],"functional":[27],"vulnerability":[28,134],"detection.":[29],"In":[30],"context":[32],"fault":[35,73,118,131],"injection,":[36],"model":[38,115],"checking":[39],"algorithm":[40],"can":[41],"be":[42],"used":[43],"to":[44,61,95,114],"detect":[45],"vulnerabilities":[46],"digital":[48],"systems":[49],"by":[50,87],"violating":[51],"nominal":[53,80],"temporal":[54],"properties.":[55,90],"We":[56],"present":[57],"a":[58,97,117,126],"general":[59],"methodology":[60,128],"reduce":[62],"state":[64],"space":[65],"that":[66],"is":[67,93],"computed":[68],"traversed":[70],"during":[71],"these":[72],"campaigns.":[74],"The":[75],"chosen":[76],"criteria":[77],"preserves":[78],"behavior":[81],"failure":[84],"modes,":[85],"expressed":[86],"fault-violated":[89],"This":[91],"process":[92],"crucial":[94],"provide":[96],"manipulable":[98],"object":[99],"subsequent":[101],"Failure":[102],"Mode":[103],"Effects":[105],"Analysis.":[106],"Finally,":[107],"we":[108],"propose":[109],"an":[110],"assumption-based":[111],"guarantee":[112],"technique":[113],"how":[116],"may":[119],"propagate":[120],"through":[121],"different":[122],"units,":[124],"scalable":[127],"injection":[132],"detection":[135],"complex":[137],"SoCs.":[138]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-12-29T00:00:00"}
