{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:34:51Z","timestamp":1750307691396,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,4,1]],"date-time":"2009-04-01T00:00:00Z","timestamp":1238544000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,4]]},"DOI":"10.1145\/1519065.1519083","type":"proceedings-article","created":{"date-parts":[[2009,4,6]],"date-time":"2009-04-06T16:34:53Z","timestamp":1239035693000},"page":"159-172","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["First-aid"],"prefix":"10.1145","author":[{"given":"Qi","family":"Gao","sequence":"first","affiliation":[{"name":"Ohio State University, Columbus, OH, USA"}]},{"given":"Wenbin","family":"Zhang","sequence":"additional","affiliation":[{"name":"Ohio State University, Columbus, OH, USA"}]},{"given":"Yan","family":"Tang","sequence":"additional","affiliation":[{"name":"Ohio State University, Columbus, OH, USA"}]},{"given":"Feng","family":"Qin","sequence":"additional","affiliation":[{"name":"Ohio State University, Columbus, OH, USA"}]}],"member":"320","published-online":{"date-parts":[[2009,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.88940"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.889093"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379232"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134000"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDS.1998.707704"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1449764.1449774"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2007.17"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/647883.738254"},{"key":"e_1_3_2_1_9_1","first-page":"31","volume-title":"Proceedings of Symposium on Operating System Design and Implementation (OSDI'04)","author":"Candea G.","year":"2004","unstructured":"G. Candea , S. Kawamoto , Y. Fujiki , G. Friedman , and A. Fox . Microreboot -- A technique for cheap recovery . In Proceedings of Symposium on Operating System Design and Implementation (OSDI'04) , pages 31 -- 44 , 2004 . G. Candea, S. Kawamoto, Y. Fujiki, G. Friedman, and A. Fox. Microreboot -- A technique for cheap recovery. In Proceedings of Symposium on Operating System Design and Implementation (OSDI'04), pages 31--44, 2004."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294274"},{"key":"e_1_3_2_1_11_1","first-page":"161","volume-title":"Proceedings of Symposium on Networked Systems Design and Implementation (NSDI'08)","author":"Cully B.","year":"2008","unstructured":"B. Cully , G. Lefebvre , D. T. Meyer , A. Karollil , M. J. Feeley , N. C. Hutchinson , and A. Warfield . Remus: High availability via asynchronous virtual machine replication . In Proceedings of Symposium on Networked Systems Design and Implementation (NSDI'08) , pages 161 -- 174 , Apr 2008 . B. Cully, G. Lefebvre, D. T. Meyer, A. Karollil, M. J. Feeley, N. C. Hutchinson, and A. Warfield. Remus: High availability via asynchronous virtual machine replication. In Proceedings of Symposium on Networked Systems Design and Implementation (NSDI'08), pages 161--174, Apr 2008."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CMPASS.1997.613248"},{"key":"e_1_3_2_1_13_1","unstructured":"GNU. Gdb: The gnu project debugger.  GNU. Gdb: The gnu project debugger."},{"key":"e_1_3_2_1_14_1","first-page":"3","volume-title":"Proceedings of Symposium on Reliable Distributed Systems (RDS' 86)","author":"Gray J.","year":"1986","unstructured":"J. Gray . Why do computers stop and what can be done about it? In Proceedings of Symposium on Reliable Distributed Systems (RDS' 86) , pages 3 -- 12 , 1986 . J. Gray. Why do computers stop and what can be done about it? In Proceedings of Symposium on Reliable Distributed Systems (RDS' 86), pages 3--12, 1986."},{"key":"e_1_3_2_1_15_1","first-page":"459","volume-title":"Proceedings of Intl. Conf. on Dependable Systems and Networks (DSN'03)","author":"Gu W.","year":"2003","unstructured":"W. Gu , Z. Kalbarczyk , R. K. Iyer , and Z. Yang . Characterization of Linux kernel behavior under errors . In Proceedings of Intl. Conf. on Dependable Systems and Networks (DSN'03) , pages 459 -- 468 , Jun 2003 . W. Gu, Z. Kalbarczyk, R. K. Iyer, and Z. Yang. Characterization of Linux kernel behavior under errors. In Proceedings of Intl. Conf. on Dependable Systems and Networks (DSN'03), pages 459--468, Jun 2003."},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the USENIX","author":"Hasting R.","year":"1992","unstructured":"R. Hasting and B. Joyce . Purify: Fast detection of memory leaks and access errors . In Proceedings of the USENIX Winter 1992 Technical Conference, pages 125- -136, Dec 1992. R. Hasting and B. Joyce. Purify: Fast detection of memory leaks and access errors. In Proceedings of the USENIX Winter 1992 Technical Conference, pages 125--136, Dec 1992."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/874064.875631"},{"key":"e_1_3_2_1_18_1","first-page":"295","volume-title":"Proceedings of Symposium on Operating System Design and Implementation (OSDI'08)","author":"Jula H.","year":"2008","unstructured":"H. Jula , D. Tralamazza , C. Zamfir , and G. Candea . Deadlock immunity: Enabling systems to defend against deadlocks . In Proceedings of Symposium on Operating System Design and Implementation (OSDI'08) , pages 295 -- 308 , Dec 2008 . H. Jula, D. Tralamazza, C. Zamfir, and G. Candea. Deadlock immunity: Enabling systems to defend against deadlocks. In Proceedings of Symposium on Operating System Design and Implementation (OSDI'08), pages 295--308, Dec 2008."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1247360.1247361"},{"key":"e_1_3_2_1_20_1","unstructured":"D. Lea. A Memory Allocator 1996.  D. Lea. A Memory Allocator 1996."},{"key":"e_1_3_2_1_21_1","volume-title":"CSE-TR-410-99","author":"Lowell D. E.","year":"1998","unstructured":"D. E. Lowell and P. M. Chen . Discount checking: Transparent, low-overhead recovery for general applications. Technical report , CSE-TR-410-99 , University of Michigan , 1998 . D. E. Lowell and P. M. Chen. Discount checking: Transparent, low-overhead recovery for general applications. Technical report, CSE-TR-410-99, University of Michigan, 1998."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346296"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134307"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250746"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250736"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060323"},{"key":"e_1_3_2_1_28_1","first-page":"213","volume-title":"Usenix Winter Technical Conference","author":"Plank J. S.","year":"1995","unstructured":"J. S. Plank , M. Beck , G. Kingsley , and K. Li . Libckpt: Transparent checkpointing under Unix . In Usenix Winter Technical Conference , pages 213 -- 224 , January 1995 . J. S. Plank,M. Beck, G. Kingsley, and K. Li. Libckpt: Transparent checkpointing under Unix. In Usenix Winter Technical Conference, pages 213--224, January 1995."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2005.29"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095833"},{"key":"e_1_3_2_1_31_1","first-page":"21","volume-title":"Proceedings of Symposium on Operating System Design and Implementation (OSDI '04)","author":"Rinard M.","year":"2004","unstructured":"M. Rinard , C. Cadar , D. Dumitran , D. M. Roy , T. Leu , and W. S. Beebee . Enhancing server availability and security through failure-oblivious computing . In Proceedings of Symposium on Operating System Design and Implementation (OSDI '04) , pages 21 -- 21 , Dec 2004 . M. Rinard, C. Cadar, D. Dumitran, D. M. Roy, T. Leu, and W. S. Beebee. Enhancing server availability and security through failure-oblivious computing. In Proceedings of Symposium on Operating System Design and Implementation (OSDI '04), pages 21--21, Dec 2004."},{"key":"e_1_3_2_1_32_1","first-page":"149","volume-title":"Proceedings of USENIX Annual Technical Conference (USENIX'05)","author":"Sidiroglou S.","year":"2005","unstructured":"S. Sidiroglou , M. E. Locasto , S. W. Boyd , and A. D. Keromytis . Building a reactive immune system for software services . In Proceedings of USENIX Annual Technical Conference (USENIX'05) , pages 149 -- 161 , 2005 . S. Sidiroglou, M. E. Locasto, S. W. Boyd, and A. D. Keromytis. Building a reactive immune system for software services. In Proceedings of USENIX Annual Technical Conference (USENIX'05), pages 149--161, 2005."},{"key":"e_1_3_2_1_33_1","unstructured":"SPEC. http:\/\/www.spec.org\/cpu2000.  SPEC. http:\/\/www.spec.org\/cpu2000."},{"key":"e_1_3_2_1_34_1","first-page":"29","volume-title":"Proceedings of the USENIX 2004 Annual Technical Conference (USENIX'04)","author":"Srinivasan S.","year":"2004","unstructured":"S. Srinivasan , C. Andrews , S. Kandula , and Y. Zhou . Flashback: A light-weight extension for rollback and deterministic replay for software debugging . In Proceedings of the USENIX 2004 Annual Technical Conference (USENIX'04) , pages 29 -- 44 , Jun 2004 . S. Srinivasan, C. Andrews, S. Kandula, and Y. Zhou. Flashback: A light-weight extension for rollback and deterministic replay for software debugging. In Proceedings of the USENIX 2004 Annual Technical Conference (USENIX'04), pages 29--44, Jun 2004."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1991.146625"},{"key":"e_1_3_2_1_36_1","unstructured":"Symantec. Internet security threat report. http:\/\/www.symantec.com\/enterprise\/threatreport\/index.jsp Sept 2006.  Symantec. Internet security threat report. http:\/\/www.symantec.com\/enterprise\/threatreport\/index.jsp Sept 2006."},{"key":"e_1_3_2_1_37_1","first-page":"307","volume-title":"Proceedings of USENIX Annual Technical Conference (USENIX'08)","author":"Tang Y.","year":"2008","unstructured":"Y. Tang , Q. Gao , and F. Qin . Leaksurvivor: Towards safely tolerating memory leaks for garbage-collected languages . In Proceedings of USENIX Annual Technical Conference (USENIX'08) , pages 307 -- 320 , Jun. 2008 . Y. Tang, Q. Gao, and F. Qin. Leaksurvivor: Towards safely tolerating memory leaks for garbage-collected languages. In Proceedings of USENIX Annual Technical Conference (USENIX'08), pages 307--320, Jun. 2008."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294275"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1272996.1273010"},{"key":"e_1_3_2_1_40_1","unstructured":"US-CERT. US-CERT vulnerability notes database. http:\/\/www.kb.cert.org\/vuls.  US-CERT. US-CERT vulnerability notes database. http:\/\/www.kb.cert.org\/vuls."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/358557.358577"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/587051.587053"},{"key":"e_1_3_2_1_43_1","first-page":"319","volume-title":"Proceedings of International Conference on Software Engineering (ICSE'03)","author":"Zhang X.","year":"2003","unstructured":"X. Zhang , R. Gupta , and Y. Zhang . Precise dynamic slicing algorithms . In Proceedings of International Conference on Software Engineering (ICSE'03) , pages 319 -- 329 , 2003 . X. Zhang, R. Gupta, and Y. Zhang. Precise dynamic slicing algorithms. In Proceedings of International Conference on Software Engineering (ICSE'03), pages 319--329, 2003."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2004.3"}],"event":{"name":"EuroSys '09: Fourth EuroSys Conference 2009","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Nuremberg Germany","acronym":"EuroSys '09"},"container-title":["Proceedings of the 4th ACM European conference on Computer systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1519065.1519083","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1519065.1519083","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:53Z","timestamp":1750253393000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1519065.1519083"}},"subtitle":["surviving and preventing memory management bugs during production runs"],"short-title":[],"issued":{"date-parts":[[2009,4]]},"references-count":44,"alternative-id":["10.1145\/1519065.1519083","10.1145\/1519065"],"URL":"https:\/\/doi.org\/10.1145\/1519065.1519083","relation":{},"subject":[],"published":{"date-parts":[[2009,4]]},"assertion":[{"value":"2009-04-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}