Research Article

Detecting Silent Data Corruptions in Aerospace-Based Computing Using Program Invariants

Figure 3

A sample assembly code before and after transformation of full instruction duplication and Radish_D.