A new approach to build a low-level malicious fault list starting from high-level description and alternative graphs