{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T15:57:51Z","timestamp":1729612671414,"version":"3.28.0"},"reference-count":61,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/dsn.2015.45","type":"proceedings-article","created":{"date-parts":[[2015,9,18]],"date-time":"2015-09-18T04:00:59Z","timestamp":1442548859000},"page":"474-484","source":"Crossref","is-referenced-by-count":13,"title":["Lightweight Memory Checkpointing"],"prefix":"10.1109","author":[{"given":"Dirk","family":"Vogt","sequence":"first","affiliation":[]},{"given":"Cristiano","family":"Giuffrida","sequence":"additional","affiliation":[]},{"given":"Herbert","family":"Bos","sequence":"additional","affiliation":[]},{"given":"Andrew S.","family":"Tanenbaum","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451129"},{"key":"ref38","first-page":"12","article-title":"Cling: A memory allocator to mitigate dangling pointers","author":"akritidis","year":"2010","journal-title":"Usenix Security"},{"key":"ref33","first-page":"121","article-title":"Taint-enhanced policy enforcement: a practical approach to defeat a wide range of attacks","author":"xu","year":"2006","journal-title":"Usenix Security"},{"key":"ref32","article-title":"Lightweight memory tracing","author":"payer","year":"0","journal-title":"Proceedings of the 2013 USENIX ATC"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1254810.1254820"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78791-4_10"},{"key":"ref37","article-title":"Too much PIE is bad for performance","author":"payer","year":"2012","journal-title":"Tech Rep"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2004.1281665"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250746"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1772954.1772960"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508275"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2006.302736"},{"key":"ref28","first-page":"28","article-title":"Address-Sanitizer: A fast address sanity checker","author":"serebryany","year":"2012"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2524224.2524236"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1806651.1806667"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSN.2000.857515"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/71.730527"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060323"},{"key":"ref22","first-page":"159","article-title":"Linux-CR: Transparent application checkpoint-restart in linux","author":"laadan","year":"0","journal-title":"Linux Symposium"},{"key":"ref21","first-page":"1","article-title":"Transparent checkpoint-restart of multiple processes on commodity operating systems","author":"laadan","year":"2007","journal-title":"USENIX ATC"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2007.370309"},{"journal-title":"CRIU","year":"0","key":"ref23"},{"key":"ref26","first-page":"335","article-title":"Dune: Safe user-level access to privileged CPU features","author":"belay","year":"2012","journal-title":"OSDI"},{"key":"ref25","first-page":"18","article-title":"Libckpt: Transparent checkpointing under unix","author":"plank","year":"1995","journal-title":"USENIX ATC"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-013-9248-5"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2005.76"},{"journal-title":"BIND","year":"0","key":"ref59"},{"journal-title":"SysBench","year":"0","key":"ref58"},{"journal-title":"pyftpdlib","year":"0","key":"ref57"},{"journal-title":"Apache Benchmark (AB)","year":"0","key":"ref56"},{"key":"ref55","first-page":"48","article-title":"Probabilistic checkpointing","author":"nam","year":"1997","journal-title":"FTCS"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24449-0_31"},{"key":"ref53","first-page":"69","article-title":"Comparing different approaches for incremental checkpointing: The showdown","author":"vasavada","year":"0","journal-title":"Linux Symposium"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/945461.945462"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25141-2_2"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1993744.1993757"},{"key":"ref40","first-page":"137","article-title":"Optimizing C multithreaded memory management using thread-local storage","author":"sade","year":"0","journal-title":"Compiler Construction"},{"key":"ref12","first-page":"3","article-title":"Flashback: A lightweight extension for rollback and deterministic replay for software debugging","author":"srinivasan","year":"2004","journal-title":"USENIX ATC"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15646-5_23"},{"key":"ref14","first-page":"1","article-title":"Debugging operating systems with time-traveling virtual machines","author":"king","year":"0","journal-title":"Proc USENIX ATC 2005"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28652-0_11"},{"key":"ref16","first-page":"23","article-title":"Lightweight snapshots and system-level backtracking","author":"bugnion","year":"2013","journal-title":"HOTOS"},{"key":"ref17","first-page":"22","article-title":"Checkpointing and its applications","author":"wang","year":"1995","journal-title":"FTCS"},{"key":"ref18","article-title":"Who watches the watchmen? - protecting operating system reliability mechanisms","author":"d\u00f6bel","year":"0","journal-title":"HotDep 2012"},{"journal-title":"OpenVZ","year":"0","key":"ref19"},{"key":"ref4","first-page":"1","article-title":"We crashed, now what?","author":"giuffrida","year":"2010","journal-title":"HotDep"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2421005"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095833"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508251"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1519065.1519083"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508250"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2010.129"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451168"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-013-0884-0"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2013.12"},{"key":"ref48","doi-asserted-by":"crossref","first-page":"494","DOI":"10.1088\/1742-6596\/46\/1\/067","article-title":"Berkeley lab checkpoint\/restart (BLCR) for linux clusters","volume":"46","author":"hargrove","year":"2006","journal-title":"Journal of Physics Conference Series"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2005.157"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065027"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250766"},{"key":"ref44","article-title":"Bypassing races in live applications with execution filters","author":"wu","year":"0","journal-title":"OSDI 2010"},{"key":"ref43","article-title":"Handling multi-versioning in LLVM: Code tracking and cloning","author":"jimborean","year":"2011","journal-title":"ACM Intermediate Representation Workshop"}],"event":{"name":"2015 45th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)","start":{"date-parts":[[2015,6,22]]},"location":"Rio de Janeiro, Brazil","end":{"date-parts":[[2015,6,25]]}},"container-title":["2015 45th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7265894\/7266818\/07266874.pdf?arnumber=7266874","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T11:07:39Z","timestamp":1602673659000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7266874"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":61,"URL":"https:\/\/doi.org\/10.1109\/dsn.2015.45","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]}}}