{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:47:12Z","timestamp":1772164032068,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,3,13]],"date-time":"2010-03-13T00:00:00Z","timestamp":1268438400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,3,13]]},"DOI":"10.1145\/1736020.1736038","type":"proceedings-article","created":{"date-parts":[[2010,3,16]],"date-time":"2010-03-16T15:27:05Z","timestamp":1268753225000},"page":"143-154","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":167,"title":["SherLog"],"prefix":"10.1145","author":[{"given":"Ding","family":"Yuan","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"Haohui","family":"Mai","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"Weiwei","family":"Xiong","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"Lin","family":"Tan","sequence":"additional","affiliation":[{"name":"University of Waterloo, Waterloo, ON, Canada"}]},{"given":"Yuanyuan","family":"Zhou","sequence":"additional","affiliation":[{"name":"University of California San Diego, San Diego, CA, USA"}]},{"given":"Shankar","family":"Pasupathy","sequence":"additional","affiliation":[{"name":"NetApp, Inc, Sunnyvale, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2010,3,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380230603"},{"key":"e_1_3_2_1_2_1","volume-title":"ISSRE'95","author":"Agrawal H.","unstructured":"H. Agrawal , J. R. Horgan , S. London , and W. E. Wong . Fault localization using execution slices and dataflow tests . In ISSRE'95 . H. Agrawal, J. R. Horgan, S. London, and W. E.Wong. Fault localization using execution slices and dataflow tests. In ISSRE'95."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945454"},{"key":"e_1_3_2_1_4_1","unstructured":"A. Aiken S. Bugrara I. Dillig T. Dillig P. Hawkins and B. Hackett. The Saturn Program Analysis System.  A. Aiken S. Bugrara I. Dillig T. Dillig P. Hawkins and B. Hackett. The Saturn Program Analysis System."},{"key":"e_1_3_2_1_5_1","volume-title":"SP '02: Proceedings of the 2002 IEEE Symposium on Security and Privacy.","author":"Ashcraft K.","unstructured":"K. Ashcraft and D. Engler . Using programmer-written compiler extensions to catch security holes . In SP '02: Proceedings of the 2002 IEEE Symposium on Security and Privacy. K. Ashcraft and D. Engler. Using programmer-written compiler extensions to catch security holes. In SP '02: Proceedings of the 2002 IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065035"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/640128.604140"},{"key":"e_1_3_2_1_8_1","volume-title":"OSDI'04","author":"Barham P.","unstructured":"P. Barham , A. Donnelly , R. Isaacs , and R. Mortier . Using magpie for request extraction and workload modelling . In OSDI'04 . P. Barham, A. Donnelly, R. Isaacs, and R. Mortier. Using magpie for request extraction and workload modelling. In OSDI'04."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453109"},{"key":"e_1_3_2_1_10_1","volume-title":"OSDI'08","author":"Cadar C.","unstructured":"C. Cadar , D. Dunbar , and D. R. Engler . Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs . In OSDI'08 . C. Cadar, D. Dunbar, and D. R. Engler. Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs. In OSDI'08."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00768-2_23"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070506"},{"key":"e_1_3_2_1_13_1","unstructured":"V. Chipounov V. Georgescu C. Zamfir and G. Candea. Selective Symbolic Execution. In HotDep'09.  V. Chipounov V. Georgescu C. Zamfir and G. Candea. Selective Symbolic Execution. In HotDep'09."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095821"},{"key":"e_1_3_2_1_15_1","volume-title":"Dell Power Solutions","year":"2008","unstructured":"Dell. Streamlined Troubleshooting with the Dell system E--Support tool . Dell Power Solutions , 2008 . Dell. Streamlined Troubleshooting with the Dell system E--Support tool. Dell Power Solutions, 2008."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/229000.226310"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508255"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1379022.1375615"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346256.1346273"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251229.1251230"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1328438.1328488"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629586"},{"key":"e_1_3_2_1_23_1","volume-title":"Why do computers stop and what can be done about it?","author":"Gray J.","year":"1985","unstructured":"J. Gray . Why do computers stop and what can be done about it? , 1985 . J. Gray. Why do computers stop and what can be done about it?, 1985."},{"key":"e_1_3_2_1_24_1","volume-title":"OSDI'08","author":"Guo Z.","unstructured":"Z. Guo , X. Wang , J. Tang , X. Liu , Z. Xu , M. Wu , M. F. Kaashoek , and Z. Zhang . R2: An application-level kernel for record and replay . In OSDI'08 . Z. Guo, X.Wang, J. Tang, X. Liu, Z. Xu, M.Wu,M. F. Kaashoek, and Z. Zhang. R2: An application-level kernel for record and replay. In OSDI'08."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/261640.261644"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/53990.53994"},{"key":"e_1_3_2_1_27_1","unstructured":"W. Jiang. Understanding storage system problems and diagnosing them through log analysis. Ph.D. Dissertation.   W. Jiang. Understanding storage system problems and diagnosing them through log analysis. Ph.D. Dissertation."},{"key":"e_1_3_2_1_28_1","volume-title":"FAST'09","author":"Jiang W.","unstructured":"W. Jiang , C. Hu , S. Pasupathy , A. Kanevsky , Z. Li , and Y. Zhou . Understanding customer problem troubleshooting from storage system logs . In FAST'09 . W. Jiang, C. Hu, S. Pasupathy, A. Kanevsky, Z. Li, and Y. Zhou. Understanding customer problem troubleshooting from storage system logs. In FAST'09."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592597"},{"key":"e_1_3_2_1_30_1","volume-title":"USENIX ATC'05","author":"King S. T.","unstructured":"S. T. King , G. W. Dunlap , and P. M. Chen . Debugging operating systems with time-traveling virtual machines . In USENIX ATC'05 . S. T. King, G. W. Dunlap, and P. M. Chen. Debugging operating systems with time-traveling virtual machines. In USENIX ATC'05."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/781131.781148"},{"key":"e_1_3_2_1_32_1","unstructured":"Apache Logging Services -- Log4j. http:\/\/logging.apache.org\/log4j.  Apache Logging Services -- Log4j. http:\/\/logging.apache.org\/log4j."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1041685.1029907"},{"key":"e_1_3_2_1_34_1","unstructured":"Mozilla Quality Feedback Agent. http:\/\/support.mozilla.com\/en-US\/kb\/quality+feedback+agent.  Mozilla Quality Feedback Agent. http:\/\/support.mozilla.com\/en-US\/kb\/quality+feedback+agent."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1168857.1168886"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2005.16"},{"key":"e_1_3_2_1_37_1","volume-title":"NetApp White Paper","year":"2007","unstructured":"NetApp. Proactive health management with auto-support . NetApp White Paper , 2007 . NetApp. Proactive health management with auto-support. NetApp White Paper, 2007."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508256"},{"key":"e_1_3_2_1_39_1","unstructured":"Squid Archives. http:\/\/www.squid-cache.org\/Versions\/v2\/2.3\/bugs\/#squid-2.3.stable4-ftp_icon_not_found.  Squid Archives. http:\/\/www.squid-cache.org\/Versions\/v2\/2.3\/bugs\/#squid-2.3.stable4-ftp_icon_not_found."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250748"},{"key":"e_1_3_2_1_41_1","first-page":"121","article-title":"A survey of program slicing techniques","volume":"3","author":"Tip F.","year":"1995","unstructured":"F. Tip . A survey of program slicing techniques . Journal of Programming Languages , 3 : 121 -- 189 , 1995 . F. Tip. A survey of program slicing techniques. Journal of Programming Languages, 3:121--189, 1995.","journal-title":"Journal of Programming Languages"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294275"},{"key":"e_1_3_2_1_43_1","unstructured":"VMWare. Using the intergrated virtual debugger for visual studio. http:\/\/www.vmware.com\/pdf\/ws65_manual.pdf.  VMWare. Using the intergrated virtual debugger for visual studio. http:\/\/www.vmware.com\/pdf\/ws65_manual.pdf."},{"key":"e_1_3_2_1_44_1","volume-title":"OSDI'04","author":"Whitaker A.","unstructured":"A. Whitaker , R. S. Cox , and S. D. Gribble . Configuration debugging as search: finding the needle in the haystack . In OSDI'04 . A. Whitaker, R. S. Cox, and S. D. Gribble. Configuration debugging as search: finding the needle in the haystack. In OSDI'04."},{"key":"e_1_3_2_1_45_1","unstructured":"Windows Error Reporting(Dr.Watson). http:\/\/www.microsoft.com\/whdc\/maintain\/StartWER.mspx.  Windows Error Reporting(Dr.Watson). http:\/\/www.microsoft.com\/whdc\/maintain\/StartWER.mspx."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/859618.859633"},{"key":"e_1_3_2_1_47_1","volume-title":"SOSP'09","author":"Xu W.","unstructured":"W. Xu , L. Huang , M. Jordan , D. Patterson , and A. Fox . Mining console logs for large-scale system problem detection . In SOSP'09 . W. Xu, L. Huang,M. Jordan, D. Patterson, and A. Fox. Mining console logs for large-scale system problem detection. In SOSP'09."},{"key":"e_1_3_2_1_48_1","volume-title":"OSDI'04","author":"Yang J.","unstructured":"J. Yang , P. Twohey , D. Engler , and M. Musuvathi . Using model checking to find serious file system errors . In OSDI'04 . J. Yang, P. Twohey, D. Engler, and M. Musuvathi. Using model checking to find serious file system errors. In OSDI'04."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1232420.1232423"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/587051.587053"}],"event":{"name":"ASPLOS '10: Architectural Support for Programming Languages and Operating Systems","location":"Pittsburgh Pennsylvania USA","acronym":"ASPLOS '10","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the fifteenth International Conference on Architectural support for programming languages and operating systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1736020.1736038","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1736020.1736038","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:41:21Z","timestamp":1750236081000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1736020.1736038"}},"subtitle":["error diagnosis by connecting clues from run-time logs"],"short-title":[],"issued":{"date-parts":[[2010,3,13]]},"references-count":50,"alternative-id":["10.1145\/1736020.1736038","10.1145\/1736020"],"URL":"https:\/\/doi.org\/10.1145\/1736020.1736038","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1735971.1736038","asserted-by":"object"},{"id-type":"doi","id":"10.1145\/1735970.1736038","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2010,3,13]]},"assertion":[{"value":"2010-03-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}