{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2026:ILNMSBVXPVEKT3ZOCSHAOF2O4N","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"2aab2bbf3611f7ab31490599e52bf327e080fee9ffe1d0cea717169e76cebbf8","cross_cats_sorted":["cs.SE"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.AR","submitted_at":"2026-05-15T05:43:33Z","title_canon_sha256":"5bb8486269fc0e2ceb4cbccd6543c387fc4f0af93adc98cbcebd49b7509e3cc2"},"schema_version":"1.0","source":{"id":"2605.15638","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2605.15638","created_at":"2026-05-20T00:01:09Z"},{"alias_kind":"arxiv_version","alias_value":"2605.15638v1","created_at":"2026-05-20T00:01:09Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2605.15638","created_at":"2026-05-20T00:01:09Z"},{"alias_kind":"pith_short_12","alias_value":"ILNMSBVXPVEK","created_at":"2026-05-20T00:01:09Z"},{"alias_kind":"pith_short_16","alias_value":"ILNMSBVXPVEKT3ZO","created_at":"2026-05-20T00:01:09Z"},{"alias_kind":"pith_short_8","alias_value":"ILNMSBVX","created_at":"2026-05-20T00:01:09Z"}],"graph_snapshots":[{"event_id":"sha256:7548949417f3804d1ac1889ea7e709624bafae24e11d9d8a0363a669b5e678ac","target":"graph","created_at":"2026-05-20T00:01:09Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":4,"items":[{"attestation":"unclaimed","claim_id":"C1","kind":"strongest_claim","source":"verdict.strongest_claim","status":"machine_extracted","text":"ITHICA error checks detect 39% more defective servers than native checks within the ITHICA tests derived from our baseline programs, and enable novel findings on defect behavior that challenge conclusions drawn by prior hyperscaler fleet studies."},{"attestation":"unclaimed","claim_id":"C2","kind":"weakest_assumption","source":"verdict.weakest_assumption","status":"machine_extracted","text":"The assumption that the most pernicious defects cause inconsistent errors such that two executions of the same instruction within the same thread, given the same inputs, can produce different architectural outputs depending on the execution context."},{"attestation":"unclaimed","claim_id":"C3","kind":"one_line_summary","source":"verdict.one_line_summary","status":"machine_extracted","text":"ITHICA generates functional tests via intra-thread instruction duplication and comparison, detecting 39% more defective servers than baseline methods on over 3000 real CPUs while revealing new defect behaviors."},{"attestation":"unclaimed","claim_id":"C4","kind":"headline","source":"verdict.pith_extraction.headline","status":"machine_extracted","text":"Intra-thread instruction duplication detects 39% more defective servers by catching inconsistent defect errors."}],"snapshot_sha256":"1689164c1d5d192055a0f89f2793a391caefbdd5158010eace8a50c4c35d0d2c"},"formal_canon":{"evidence_count":2,"snapshot_sha256":"e937278f377dcff0410551f4e46179f05f3b1bc2e32b397b30f427d651be8fb4"},"integrity":{"available":true,"clean":true,"detectors_run":[{"findings_count":0,"name":"doi_compliance","ran_at":"2026-05-19T20:01:28.686361Z","status":"completed","version":"1.0.0"},{"findings_count":0,"name":"doi_title_agreement","ran_at":"2026-05-19T20:01:19.266847Z","status":"completed","version":"1.0.0"},{"findings_count":0,"name":"ai_meta_artifact","ran_at":"2026-05-19T19:33:35.672626Z","status":"skipped","version":"1.0.0"},{"findings_count":0,"name":"claim_evidence","ran_at":"2026-05-19T17:41:56.018084Z","status":"completed","version":"1.0.0"}],"endpoint":"/pith/2605.15638/integrity.json","findings":[],"snapshot_sha256":"d0b624c56118ad54b5d913e83ff283dbf1b711df8ae44e6faf8dc4bea15c80c9","summary":{"advisory":0,"by_detector":{},"critical":0,"informational":0}},"paper":{"abstract_excerpt":"Hyperscaler reports of silent data corruptions (SDCs), presumed to be caused by silicon manufacturing defects, have motivated the development of functional tests for detecting defective CPUs. We present ITHICA, an approach for automatically generating functional tests for defect-induced errors from arbitrary programs by inserting intra-thread, instruction-level error checks, primarily leveraging instruction duplication and output comparison. Our key insight is that the most pernicious defects cause inconsistent errors: two executions of the same instruction within the same thread, given the sa","authors_text":"Caroline Trippel, Eric X. Liu, Ioanna Vavelidou, Mike Fuller, Subhasish Mitra, Subho S. Banerjee","cross_cats":["cs.SE"],"headline":"Intra-thread instruction duplication detects 39% more defective servers by catching inconsistent defect errors.","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.AR","submitted_at":"2026-05-15T05:43:33Z","title":"ITHICA: Intra-Thread Instruction Checking Approach for Defect-Induced Silent Data Corruptions"},"references":{"count":88,"internal_anchors":1,"resolved_work":88,"sample":[{"cited_arxiv_id":"","doi":"10.1109/ispass61541.2024.00046","is_internal_anchor":false,"ref_index":1,"title":"LIBRA: Enabling Workload-Aware Multi-Dimensional Network Topology Optimization for Distributed Training of Large AI Models","work_id":"f8880ac8-b753-4a3a-84e9-c49f43978e60","year":2024},{"cited_arxiv_id":"","doi":"10.1145/3297858.3304062","is_internal_anchor":false,"ref_index":2,"title":"Andreas Abel and Jan Reineke. 2019. uops.info: Characterizing Latency, Through- put, and Port Usage of Instructions on Intel Microarchitectures. InASPLOS (Providence, RI, USA)(ASPLOS ’19). ACM, New Yo","work_id":"c24239f6-6361-4aeb-b359-cbd765b7d8e5","year":2019},{"cited_arxiv_id":"","doi":"","is_internal_anchor":false,"ref_index":3,"title":"abseil 2024. Abseil. https://github.com/abseil/abseil-cpp","work_id":"0fd8105e-775a-4a79-9d62-7048a757d781","year":2024},{"cited_arxiv_id":"","doi":"10.1109/vts.2007.22","is_internal_anchor":false,"ref_index":4,"title":"Paul, Ming Zhang, and Subhasish Mitra","work_id":"7558cfb7-f8b3-4069-8ca7-e76a8e329467","year":2007},{"cited_arxiv_id":"","doi":"","is_internal_anchor":false,"ref_index":5,"title":"Chang, Chao-Wen Tseng, Chien-Mo James Li, Mike Purtell, and Edward Joseph McCluskey","work_id":"9be31cf1-8c3c-4898-bb2c-ef3bfa584fc6","year":1998}],"snapshot_sha256":"7787e43102cc6b177e451c438df60a882cf42a1c8934453e8ed71fe8806dea24"},"source":{"id":"2605.15638","kind":"arxiv","version":1},"verdict":{"created_at":"2026-05-19T19:49:05.506826Z","id":"2fbe9bf0-33e1-40e8-89b4-8e00e02bb3f6","model_set":{"reader":"grok-4.3"},"one_line_summary":"ITHICA generates functional tests via intra-thread instruction duplication and comparison, detecting 39% more defective servers than baseline methods on over 3000 real CPUs while revealing new defect behaviors.","pipeline_version":"pith-pipeline@v0.9.0","pith_extraction_headline":"Intra-thread instruction duplication detects 39% more defective servers by catching inconsistent defect errors.","strongest_claim":"ITHICA error checks detect 39% more defective servers than native checks within the ITHICA tests derived from our baseline programs, and enable novel findings on defect behavior that challenge conclusions drawn by prior hyperscaler fleet studies.","weakest_assumption":"The assumption that the most pernicious defects cause inconsistent errors such that two executions of the same instruction within the same thread, given the same inputs, can produce different architectural outputs depending on the execution context."}},"verdict_id":"2fbe9bf0-33e1-40e8-89b4-8e00e02bb3f6"}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:4dcb88c2c6adb2984d06c7200b80a5cf540ffebde9a700ffaf701285ce4a37a4","target":"record","created_at":"2026-05-20T00:01:09Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"2aab2bbf3611f7ab31490599e52bf327e080fee9ffe1d0cea717169e76cebbf8","cross_cats_sorted":["cs.SE"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.AR","submitted_at":"2026-05-15T05:43:33Z","title_canon_sha256":"5bb8486269fc0e2ceb4cbccd6543c387fc4f0af93adc98cbcebd49b7509e3cc2"},"schema_version":"1.0","source":{"id":"2605.15638","kind":"arxiv","version":1}},"canonical_sha256":"42dac906b77d48a9ef2e148e07174ee359dd6f9477d5952e45fcfc2d0c6fe3bd","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"42dac906b77d48a9ef2e148e07174ee359dd6f9477d5952e45fcfc2d0c6fe3bd","first_computed_at":"2026-05-20T00:01:09.496264Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-20T00:01:09.496264Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"deqzZEsGnbcdHQunFZd664s1MWAePGD+gdUf80AfvFPnrWedC08JBLgkzEQvYVVwtyAmx+bsxVKnYoieUxLTAA==","signature_status":"signed_v1","signed_at":"2026-05-20T00:01:09.497108Z","signed_message":"canonical_sha256_bytes"},"source_id":"2605.15638","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:4dcb88c2c6adb2984d06c7200b80a5cf540ffebde9a700ffaf701285ce4a37a4","sha256:7548949417f3804d1ac1889ea7e709624bafae24e11d9d8a0363a669b5e678ac"],"state_sha256":"92361bec9227b285929ee2303ccfcf9cade659b51d9f18f6a9e13eefb4a0613d"}