{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:55:34Z","timestamp":1750308934730,"version":"3.41.0"},"reference-count":48,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2005,3,1]],"date-time":"2005-03-01T00:00:00Z","timestamp":1109635200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Archit. Code Optim."],"published-print":{"date-parts":[[2005,3]]},"abstract":"<jats:p>\n            Recent impressive performance improvements in computer architecture have not led to significant gains in the case of debugging. Software debugging often relies on inserting run-time software checks. In many cases, however, it is hard to find the root cause of a bug. Moreover, program execution typically slows down significantly, often by 10--100 times.To address this problem, this paper introduces the\n            <jats:italic>intelligent watcher (iWatcher)<\/jats:italic>\n            , a novel architectural scheme to monitor dynamic execution automatically, flexibly, and with minimal overhead. iWatcher associates program-specified monitoring functions with memory locations. When any such location is accessed, the monitoring function is automatically triggered with low overhead. To further reduce overhead and support rollback, iWatcher can optionally leverage thread-level speculation (TLS). The iWatcher architecture can be used to detect various bugs, including buffer overflow, accessing freed locations, memory leaks, stack-smashing and value-invariant violations. To evaluate iWatcher, we use seven applications with various real and injected bugs. Our results show that iWatcher detects many more software bugs than Valgrind, a well-known open-source bug detector. Moreover, iWatcher only induces a 0.1--179% execution overhead, which is orders of magnitude less than Valgrind. Our sensitivity study shows that even with 20% of the dynamic loads monitored in a program, iWatcher adds only 72--182% overhead. Finally, TLS is effective at reducing overheads for programs with substantial monitoring.\n          <\/jats:p>","DOI":"10.1145\/1061267.1061269","type":"journal-article","created":{"date-parts":[[2005,8,1]],"date-time":"2005-08-01T17:31:42Z","timestamp":1122917502000},"page":"3-33","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["Efficient and flexible architectural support for dynamic monitoring"],"prefix":"10.1145","volume":"2","author":[{"given":"Yuanyuan","family":"Zhou","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL"}]},{"given":"Pin","family":"Zhou","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL"}]},{"given":"Feng","family":"Qin","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL"}]},{"given":"Wei","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL"}]},{"given":"Josep","family":"Torrellas","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL"}]}],"member":"320","published-online":{"date-parts":[[2005,3]]},"reference":[{"volume-title":"Proceedings of the ACM SIGPLAN 1994 Conference on Programming Language Design and Implementation (PLDI). 290--301","author":"Austin T. M.","key":"e_1_2_1_1_1","unstructured":"Austin , T. M. , Breach , S. E. , and Sohi , G. S . 1994. Efficient detection of all pointer and array access errors . In Proceedings of the ACM SIGPLAN 1994 Conference on Programming Language Design and Implementation (PLDI). 290--301 . 10.1145\/178243.178446 Austin, T. M., Breach, S. E., and Sohi, G. S. 1994. Efficient detection of all pointer and array access errors. In Proceedings of the ACM SIGPLAN 1994 Conference on Programming Language Design and Implementation (PLDI). 290--301. 10.1145\/178243.178446"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1177\/109434200001400404"},{"volume-title":"Proceedings of the ACM SIGPLAN 2002 Conference on Programming Language Design and Implementation (PLDI). 258--269","author":"Choi J.-D.","key":"e_1_2_1_3_1","unstructured":"Choi , J.-D. , Lee , K. , Loginov , A. , O'Callahan , R. , Sarkar , V. , and Sridharan , M . 2002. Efficient and precise datarace detection for multithreaded object-oriented programs . In Proceedings of the ACM SIGPLAN 2002 Conference on Programming Language Design and Implementation (PLDI). 258--269 . 10.1145\/512529.512560 Choi, J.-D., Lee, K., Loginov, A., O'Callahan, R., Sarkar, V., and Sridharan, M. 2002. Efficient and precise datarace detection for multithreaded object-oriented programs. In Proceedings of the ACM SIGPLAN 2002 Conference on Programming Language Design and Implementation (PLDI). 258--269. 10.1145\/512529.512560"},{"volume-title":"Proceedings of the 27th Annual International Symposium on Computer Architecture (ISCA). 13--24","author":"Cintra M.","key":"e_1_2_1_4_1","unstructured":"Cintra , M. , Martinez , J. , and Torrellas , J . 2000. Architectural support for scalable speculative parallelization in shared-memory systems . In Proceedings of the 27th Annual International Symposium on Computer Architecture (ISCA). 13--24 . 10.1145\/339647.363382 Cintra, M., Martinez, J., and Torrellas, J. 2000. Architectural support for scalable speculative parallelization in shared-memory systems. In Proceedings of the 27th Annual International Symposium on Computer Architecture (ISCA). 13--24. 10.1145\/339647.363382"},{"volume-title":"Proceedings of the ACM SIGPLAN 2003 Conference on Programming Language Design and Implementation (PLDI). 232--244","author":"Condit J.","key":"e_1_2_1_5_1","unstructured":"Condit , J. , Harren , M. , McPeak , S. , Necula , G. C. , and Weimer , W . 2003. CCured in the real world . In Proceedings of the ACM SIGPLAN 2003 Conference on Programming Language Design and Implementation (PLDI). 232--244 . 10.1145\/781131.781157 Condit, J., Harren, M., McPeak, S., Necula, G. C., and Weimer, W. 2003. CCured in the real world. In Proceedings of the ACM SIGPLAN 2003 Conference on Programming Language Design and Implementation (PLDI). 232--244. 10.1145\/781131.781157"},{"volume-title":"Proceedings of the 7th USENIX Security Symposium. 63--78","author":"Cowan C.","key":"e_1_2_1_6_1","unstructured":"Cowan , C. et al. 1998. StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks . In Proceedings of the 7th USENIX Security Symposium. 63--78 . Cowan, C. et al. 1998. StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks. In Proceedings of the 7th USENIX Security Symposium. 63--78."},{"volume-title":"Proceedings of the 30th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO). 292--302","author":"Dean J.","key":"e_1_2_1_7_1","unstructured":"Dean , J. , Hicks , J. E. , Waldspurger , C. A. , Weihl , W. E. , and Chrysos , G. Z . 1997. ProfileMe: Hardware support for instruction-level profiling on out-of-order processors . In Proceedings of the 30th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO). 292--302 . Dean, J., Hicks, J. E., Waldspurger, C. A., Weihl, W. E., and Chrysos, G. Z. 1997. ProfileMe: Hardware support for instruction-level profiling on out-of-order processors. In Proceedings of the 30th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO). 292--302."},{"volume-title":"Proceedings of the 19th ACM Symposium on Operating Systems Principles. 237--252","author":"Engler D.","key":"e_1_2_1_8_1","unstructured":"Engler , D. and Ashcraft , K . 2003. RacerX: Effective, static detection of race conditions and deadlocks . In Proceedings of the 19th ACM Symposium on Operating Systems Principles. 237--252 . 10.1145\/945445.945468 Engler, D. and Ashcraft, K. 2003. RacerX: Effective, static detection of race conditions and deadlocks. In Proceedings of the 19th ACM Symposium on Operating Systems Principles. 237--252. 10.1145\/945445.945468"},{"volume-title":"Proceedings of the 22nd International Conference on Software Engineering (ICSE). 449--458","author":"Ernst M. D.","key":"e_1_2_1_9_1","unstructured":"Ernst , M. D. , Czeisler , A. , Griswold , W. G. , and Notkin , D . 2000. Quickly detecting relevant program invariants . In Proceedings of the 22nd International Conference on Software Engineering (ICSE). 449--458 . 10.1145\/337180.337240 Ernst, M. D., Czeisler, A., Griswold, W. G., and Notkin, D. 2000. Quickly detecting relevant program invariants. In Proceedings of the 22nd International Conference on Software Engineering (ICSE). 449--458. 10.1145\/337180.337240"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/361011.361070"},{"volume-title":"Proceedings of the 10th USENIX Security Symposium. 55--66","author":"Frantzen M.","key":"e_1_2_1_11_1","unstructured":"Frantzen , M. and Shuey , M . 2001. StackGhost: Hardware facilitated stack protection . In Proceedings of the 10th USENIX Security Symposium. 55--66 . Frantzen, M. and Shuey, M. 2001. StackGhost: Hardware facilitated stack protection. In Proceedings of the 10th USENIX Security Symposium. 55--66."},{"volume-title":"Proceedings of the ACM SIGPLAN 2002 Conference on Programming Language Design and Implementation (PLDI). 69--82","author":"Hallem S.","key":"e_1_2_1_12_1","unstructured":"Hallem , S. , Chelf , B. , Xie , Y. , and Engler , D . 2002. A system and language for building system-specific, static analyses . In Proceedings of the ACM SIGPLAN 2002 Conference on Programming Language Design and Implementation (PLDI). 69--82 . 10.1145\/512529.512539 Hallem, S., Chelf, B., Xie, Y., and Engler, D. 2002. A system and language for building system-specific, static analyses. In Proceedings of the ACM SIGPLAN 2002 Conference on Programming Language Design and Implementation (PLDI). 69--82. 10.1145\/512529.512539"},{"volume-title":"Proceedings of the 22nd International Conference on Software Engineering (ICSE). 291--301","author":"Hangal S.","key":"e_1_2_1_13_1","unstructured":"Hangal , S. and Lam , M. S . 2002. Tracking down software bugs using automatic anomaly detection . In Proceedings of the 22nd International Conference on Software Engineering (ICSE). 291--301 . 10.1145\/581339.581377 Hangal, S. and Lam, M. S. 2002. Tracking down software bugs using automatic anomaly detection. In Proceedings of the 22nd International Conference on Software Engineering (ICSE). 291--301. 10.1145\/581339.581377"},{"volume-title":"Proceedings of the 1999 USENIX Winter Technical Conference. 125--136","author":"Hastings R.","key":"e_1_2_1_14_1","unstructured":"Hastings , R. and Joyce , B . 1992. Purify: Fast detection of memory leaks and access errors . In Proceedings of the 1999 USENIX Winter Technical Conference. 125--136 . Hastings, R. and Joyce, B. 1992. Purify: Fast detection of memory leaks and access errors. In Proceedings of the 1999 USENIX Winter Technical Conference. 125--136."},{"key":"e_1_2_1_15_1","unstructured":"Intel Corporation. 2001. The IA-32 Intel Architecture Software Developer's Manual Volume 2: Instruction Set Reference.  Intel Corporation. 2001. The IA-32 Intel Architecture Software Developer's Manual Volume 2: Instruction Set Reference."},{"key":"e_1_2_1_16_1","volume-title":"Proceedings of the 1st International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS). 140--148","author":"Johnson M. S.","year":"1982","unstructured":"Johnson , M. S. 1982 . Some requirements for architectural support of software debugging . In Proceedings of the 1st International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS). 140--148 . 10.1145\/800050.801837 Johnson, M. S. 1982. Some requirements for architectural support of software debugging. In Proceedings of the 1st International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS). 140--148. 10.1145\/800050.801837"},{"key":"e_1_2_1_17_1","unstructured":"KAI-Intel Corporation. Intel thread checker. URL: http:\/\/developer.intel.com\/software\/products\/threading\/tcwin.  KAI-Intel Corporation. Intel thread checker. URL: http:\/\/developer.intel.com\/software\/products\/threading\/tcwin."},{"key":"e_1_2_1_18_1","unstructured":"Kane G. and Heinrich J. 1992. MIPS RISC Architecture. Prentice-Hall Englewood Cliffs NJ.   Kane G. and Heinrich J. 1992. MIPS RISC Architecture. Prentice-Hall Englewood Cliffs NJ."},{"volume-title":"Proceedings of the 5th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS). 175--186","author":"Koldinger E. J.","key":"e_1_2_1_19_1","unstructured":"Koldinger , E. J. , Chase , J. S. , and Eggers , S. J . 1992. Architectural support for single address space operating systems . In Proceedings of the 5th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS). 175--186 . 10.1145\/143365.143508 Koldinger, E. J., Chase, J. S., and Eggers, S. J. 1992. Architectural support for single address space operating systems. In Proceedings of the 5th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS). 175--186. 10.1145\/143365.143508"},{"key":"e_1_2_1_20_1","volume-title":"Proceedings of the ACM SIGPLAN 1995 Conference on Programming Language Design and Implementation (PLDI). 291--300","author":"Larus J.","year":"2071","unstructured":"Larus , J. and Schnarr , E . 1995. EEL: Machine-independent executable editing . In Proceedings of the ACM SIGPLAN 1995 Conference on Programming Language Design and Implementation (PLDI). 291--300 . 10.1145\/ 2071 10.207163 Larus, J. and Schnarr, E. 1995. EEL: Machine-independent executable editing. In Proceedings of the ACM SIGPLAN 1995 Conference on Programming Language Design and Implementation (PLDI). 291--300. 10.1145\/207110.207163"},{"volume-title":"Capability-Based Computer Systems","author":"Levy H. M.","key":"e_1_2_1_21_1","unstructured":"Levy , H. M. 1984. Capability-Based Computer Systems . Digital Press , Bedford, MA . Levy, H. M. 1984. Capability-Based Computer Systems. Digital Press, Bedford, MA."},{"volume-title":"Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS). 168--177","author":"Lie D.","key":"e_1_2_1_22_1","unstructured":"Lie , D. et al. 2000. Architectural support for copy and tamper resistant software . In Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS). 168--177 . 10.1145\/378993.379237 Lie, D. et al. 2000. Architectural support for copy and tamper resistant software. In Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS). 168--177. 10.1145\/378993.379237"},{"volume-title":"the 4th International Conference on Fundamental Approaches to Software Engineering (FASE). 217--232","author":"Loginov A.","key":"e_1_2_1_23_1","unstructured":"Loginov , A. , Yong , S. H. , Horwitz , S. , and Reps , T. W . 2001. Debugging via run-time type checking . In the 4th International Conference on Fundamental Approaches to Software Engineering (FASE). 217--232 . Loginov, A., Yong, S. H., Horwitz, S., and Reps, T. W. 2001. Debugging via run-time type checking. In the 4th International Conference on Fundamental Approaches to Software Engineering (FASE). 217--232."},{"key":"e_1_2_1_24_1","unstructured":"Marcus E. and Stern H. 2000. Blueprints for High Availability. J Willey New York.   Marcus E. and Stern H. 2000. Blueprints for High Availability. J Willey New York."},{"volume-title":"Proceedings of the 5th Symposium on Operating System Design and Implementation (SOSP). 75--88","author":"Musuvathi M.","key":"e_1_2_1_25_1","unstructured":"Musuvathi , M. , Park , D. , Chou , A. , Engler , D. R. , and Dill , D. L . 2002. CMC: A pragmatic approach to model checking real code . In Proceedings of the 5th Symposium on Operating System Design and Implementation (SOSP). 75--88 . 10.1145\/1060289.1060297 Musuvathi, M., Park, D., Chou, A., Engler, D. R., and Dill, D. L. 2002. CMC: A pragmatic approach to model checking real code. In Proceedings of the 5th Symposium on Operating System Design and Implementation (SOSP). 75--88. 10.1145\/1060289.1060297"},{"key":"e_1_2_1_26_1","first-page":"2002","article-title":"Software errors cost U.S. economy &dollar;59.5 billion annually","author":"National Institute of Standards and Technlogy (NIST), Department of Commerce.","year":"2002","unstructured":"National Institute of Standards and Technlogy (NIST), Department of Commerce. 2002 . Software errors cost U.S. economy &dollar;59.5 billion annually . NIST News Release 2002 - 2010 . National Institute of Standards and Technlogy (NIST), Department of Commerce. 2002. Software errors cost U.S. economy &dollar;59.5 billion annually. NIST News Release 2002-10.","journal-title":"NIST News Release"},{"volume-title":"The 29th SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL). 128--139","author":"Necula G. C.","key":"e_1_2_1_27_1","unstructured":"Necula , G. C. , McPeak , S. , and Weimer , W . 2002. CCured: Type-safe retrofitting of legacy code . In The 29th SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL). 128--139 . 10.1145\/503272.503286 Necula, G. C., McPeak, S., and Weimer, W. 2002. CCured: Type-safe retrofitting of legacy code. In The 29th SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL). 128--139. 10.1145\/503272.503286"},{"volume-title":"Proceedings of the 3rd International Workshop on Runtime Verification (RV).","author":"Nethercote N.","key":"e_1_2_1_28_1","unstructured":"Nethercote , N. and Seward , J . 2003. Valgrind: A program supervision framework . In Proceedings of the 3rd International Workshop on Runtime Verification (RV). Nethercote, N. and Seward, J. 2003. Valgrind: A program supervision framework. In Proceedings of the 3rd International Workshop on Runtime Verification (RV)."},{"key":"e_1_2_1_29_1","unstructured":"One A. 1996. Smashing the stack for fun and profit. Phrack Magazine.  One A. 1996. Smashing the stack for fun and profit. Phrack Magazine."},{"volume-title":"Proceedings of the 10th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS). 184--196","author":"Oplinger J.","key":"e_1_2_1_30_1","unstructured":"Oplinger , J. and Lam , M. S . 2002. Enhancing software reliability with speculative threads . In Proceedings of the 10th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS). 184--196 . 10.1145\/605397.605417 Oplinger, J. and Lam, M. S. 2002. Enhancing software reliability with speculative threads. In Proceedings of the 10th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS). 184--196. 10.1145\/605397.605417"},{"volume-title":"Proceedings of the 2nd International Workshop on Automated and Algorithmic Debugging (AADEBUG). 119--132","author":"Patil H.","key":"e_1_2_1_31_1","unstructured":"Patil , H. and Fischer , C. N . 1995. Efficient run-time monitoring using shadow processing . In Proceedings of the 2nd International Workshop on Automated and Algorithmic Debugging (AADEBUG). 119--132 . Patil, H. and Fischer, C. N. 1995. Efficient run-time monitoring using shadow processing. In Proceedings of the 2nd International Workshop on Automated and Algorithmic Debugging (AADEBUG). 119--132."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-024X(199701)27:1%3C87::AID-SPE78%3E3.0.CO;2-P"},{"volume-title":"Proceedings of the 30th Annual International Symposium on Computer Architecture (ISCA). 110--121","author":"Prvulovic M.","key":"e_1_2_1_33_1","unstructured":"Prvulovic , M. and Torrellas , J . 2003. ReEnact: Using thread-level speculation mechanisms to debug data races in multithreaded codes . In Proceedings of the 30th Annual International Symposium on Computer Architecture (ISCA). 110--121 . 10.1145\/859618.859632 Prvulovic, M. and Torrellas, J. 2003. ReEnact: Using thread-level speculation mechanisms to debug data races in multithreaded codes. In Proceedings of the 30th Annual International Symposium on Computer Architecture (ISCA). 110--121. 10.1145\/859618.859632"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/265924.265927"},{"volume-title":"Proceedings of the 30th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO). 288--297","author":"Schnarr E.","key":"e_1_2_1_35_1","unstructured":"Schnarr , E. and Larus , J. R . 1996. Instruction scheduling and executable editing . In Proceedings of the 30th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO). 288--297 . Schnarr, E. and Larus, J. R. 1996. Instruction scheduling and executable editing. In Proceedings of the 30th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO). 288--297."},{"key":"e_1_2_1_36_1","volume-title":"Proceedings of the 6th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS). 297--306","author":"Schoinas I.","year":"1954","unstructured":"Schoinas , I. et al. 1994. Fine-grain access control for distributed shared memory . In Proceedings of the 6th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS). 297--306 . 10.1145\/ 1954 73.195575 Schoinas, I. et al. 1994. Fine-grain access control for distributed shared memory. In Proceedings of the 6th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS). 297--306. 10.1145\/195473.195575"},{"volume-title":"Proceedings of the 22nd Annual International Symposium on Computer Architecture (ISCA). 414--425","author":"Sohi G.","key":"e_1_2_1_37_1","unstructured":"Sohi , G. , Breach , S. , and Vijayakumar , T . 1995. Multiscalar processors . In Proceedings of the 22nd Annual International Symposium on Computer Architecture (ISCA). 414--425 . 10.1145\/223982.224451 Sohi, G., Breach, S., and Vijayakumar, T. 1995. Multiscalar processors. In Proceedings of the 22nd Annual International Symposium on Computer Architecture (ISCA). 414--425. 10.1145\/223982.224451"},{"volume-title":"The SPARC Architecture Manual: Version 8","author":"International","key":"e_1_2_1_38_1","unstructured":"SPARC International . 1992. The SPARC Architecture Manual: Version 8 . Prentice-Hall , Englewood Cliffs, NJ . SPARC International. 1992. The SPARC Architecture Manual: Version 8. Prentice-Hall, Englewood Cliffs, NJ."},{"volume-title":"Proceedings of the ACM SIGPLAN 1994 Conference on Programming Language Design and Implementation (PLDI). 196--205","author":"Srivastava A.","key":"e_1_2_1_39_1","unstructured":"Srivastava , A. and Eustace , A . 1994. ATOM: A system for building customized program analysis tools . In Proceedings of the ACM SIGPLAN 1994 Conference on Programming Language Design and Implementation (PLDI). 196--205 . 10.1145\/178243.178260 Srivastava, A. and Eustace, A. 1994. ATOM: A system for building customized program analysis tools. In Proceedings of the ACM SIGPLAN 1994 Conference on Programming Language Design and Implementation (PLDI). 196--205. 10.1145\/178243.178260"},{"volume-title":"Proceedings of the 27th Annual International Symposium on Computer Architecture (ISCA). 1--12","author":"Steffan J. G.","key":"e_1_2_1_40_1","unstructured":"Steffan , J. G. , Colohan , C. B. , Zhai , A. , and Mowry , T. C . 2000. A scalable approach to thread-level speculation . In Proceedings of the 27th Annual International Symposium on Computer Architecture (ISCA). 1--12 . 10.1145\/339647.339650 Steffan, J. G., Colohan, C. B., Zhai, A., and Mowry, T. C. 2000. A scalable approach to thread-level speculation. In Proceedings of the 27th Annual International Symposium on Computer Architecture (ISCA). 1--12. 10.1145\/339647.339650"},{"volume-title":"Conference on Correct Hardware Design and Verification Methods (CHARME). 21--34","author":"Stern U.","key":"e_1_2_1_41_1","unstructured":"Stern , U. and Dill , D. L . 1995. Automatic verification of the SCI cache coherence protocol . In Conference on Correct Hardware Design and Verification Methods (CHARME). 21--34 . Stern, U. and Dill, D. L. 1995. Automatic verification of the SCI cache coherence protocol. In Conference on Correct Hardware Design and Verification Methods (CHARME). 21--34."},{"volume-title":"Proceedings of the 17th Annual International Conference on Supercomputing (ICS). 160--171","author":"Suh G.","key":"e_1_2_1_42_1","unstructured":"Suh , G. , Clarke , D. , Gassend , B. , van Dijk , M. , and Devadas , S . 2003. AEGIS: Architecture for tamper-evident and tamper-resistant processing . In Proceedings of the 17th Annual International Conference on Supercomputing (ICS). 160--171 . 10.1145\/782814.782838 Suh, G., Clarke, D., Gassend, B., van Dijk, M., and Devadas, S. 2003. AEGIS: Architecture for tamper-evident and tamper-resistant processing. In Proceedings of the 17th Annual International Conference on Supercomputing (ICS). 160--171. 10.1145\/782814.782838"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.795219"},{"volume-title":"Proceedings of the ACM SIGPLAN 1993 Conference on Programming Language Design and Implementation (PLDI). 1--12","author":"Wahbe R.","key":"e_1_2_1_44_1","unstructured":"Wahbe , R. , Lucco , S. , and Graham , S. L . 1993. Practical data breakpoints: Design and implementation . In Proceedings of the ACM SIGPLAN 1993 Conference on Programming Language Design and Implementation (PLDI). 1--12 . 10.1145\/155090.155091 Wahbe, R., Lucco, S., and Graham, S. L. 1993. Practical data breakpoints: Design and implementation. In Proceedings of the ACM SIGPLAN 1993 Conference on Programming Language Design and Implementation (PLDI). 1--12. 10.1145\/155090.155091"},{"volume-title":"Proceedings of the 10th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS). 304--316","author":"Witchel E.","key":"e_1_2_1_45_1","unstructured":"Witchel , E. , Cates , J. , and Asanovi\u0107 , K . 2002. Mondrian memory protection . In Proceedings of the 10th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS). 304--316 . 10.1145\/605397.605429 Witchel, E., Cates, J., and Asanovi\u0107, K. 2002. Mondrian memory protection. In Proceedings of the 10th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS). 304--316. 10.1145\/605397.605429"},{"volume-title":"2nd Workshop on Evaluating and Architecting System Dependability (EASY).","author":"Xu J.","key":"e_1_2_1_46_1","unstructured":"Xu , J. , Kalbarczyk , Z. , Patel , S. , and Iyer , R. K . 2002. Architecture support for defending against buffer overflow attacks . In 2nd Workshop on Evaluating and Architecting System Dependability (EASY). Xu, J., Kalbarczyk, Z., Patel, S., and Iyer, R. K. 2002. Architecture support for defending against buffer overflow attacks. In 2nd Workshop on Evaluating and Architecting System Dependability (EASY)."},{"volume-title":"Proceedings of the 30th Annual International Symposium on Computer Architecture (ISCA). 122--133","author":"Xu M.","key":"e_1_2_1_47_1","unstructured":"Xu , M. , Bod\u00edk , R. , and Hill , M. D. 2003. A \u201cflight data recorder\u201d for enabling full-system multiprocessor deterministic replay . In Proceedings of the 30th Annual International Symposium on Computer Architecture (ISCA). 122--133 . 10.1145\/859618.859633 Xu, M., Bod\u00edk, R., and Hill, M. D. 2003. A \u201cflight data recorder\u201d for enabling full-system multiprocessor deterministic replay. In Proceedings of the 30th Annual International Symposium on Computer Architecture (ISCA). 122--133. 10.1145\/859618.859633"},{"volume-title":"Proceedings of the 31st Annual International Symposium on Computer Architecture (ISCA). 224--235","author":"Zhou P.","key":"e_1_2_1_48_1","unstructured":"Zhou , P. , Qin , F. , Liu , W. , Zhou , Y. , and Torrellas , J . 2004. iWatcher: Efficient architectural support for software debugging . In Proceedings of the 31st Annual International Symposium on Computer Architecture (ISCA). 224--235 . Zhou, P., Qin, F., Liu, W., Zhou, Y., and Torrellas, J. 2004. iWatcher: Efficient architectural support for software debugging. In Proceedings of the 31st Annual International Symposium on Computer Architecture (ISCA). 224--235."}],"container-title":["ACM Transactions on Architecture and Code Optimization"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1061267.1061269","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1061267.1061269","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:36:56Z","timestamp":1750282616000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1061267.1061269"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,3]]},"references-count":48,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2005,3]]}},"alternative-id":["10.1145\/1061267.1061269"],"URL":"https:\/\/doi.org\/10.1145\/1061267.1061269","relation":{},"ISSN":["1544-3566","1544-3973"],"issn-type":[{"type":"print","value":"1544-3566"},{"type":"electronic","value":"1544-3973"}],"subject":[],"published":{"date-parts":[[2005,3]]},"assertion":[{"value":"2005-03-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}