{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T05:22:26Z","timestamp":1769750546715,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,11,3]],"date-time":"2013-11-03T00:00:00Z","timestamp":1383436800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100004316","name":"International Business Machines Corporation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100004316","id-type":"DOI","asserted-by":"publisher"}]},{"name":"NetApp's Faculty Fellowship program"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,11,3]]},"DOI":"10.1145\/2517349.2522718","type":"proceedings-article","created":{"date-parts":[[2013,10,8]],"date-time":"2013-10-08T13:27:04Z","timestamp":1381238824000},"page":"101-115","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Fast dynamic binary translation for the kernel"],"prefix":"10.1145","author":[{"given":"Piyus","family":"Kedia","sequence":"first","affiliation":[{"name":"Indian Institute of Technology Delhi"}]},{"given":"Sorav","family":"Bansal","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Delhi"}]}],"member":"320","published-online":{"date-parts":[[2013,11,3]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Fast Dynamic Binary Translation for the Kernel. https:\/\/github.com\/piyus\/btkernel, as on","year":"2013","unstructured":"BTKernel : Fast Dynamic Binary Translation for the Kernel. https:\/\/github.com\/piyus\/btkernel, as on September 15, 2013 . BTKernel: Fast Dynamic Binary Translation for the Kernel. https:\/\/github.com\/piyus\/btkernel, as on September 15, 2013."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1168857.1168860"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1899928.1899930"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/358438.349303"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/143365.143523"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2151024.2151043"},{"key":"e_1_3_2_2_8_1","volume-title":"Binary translator with precise exception synchronization mechanism. US Patent 7516453, filed","author":"Bugnion E.","year":"2000","unstructured":"E. Bugnion . Binary translator with precise exception synchronization mechanism. US Patent 7516453, filed June 2000 . E. Bugnion. Binary translator with precise exception synchronization mechanism. US Patent 7516453, filed June 2000."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1254810.1254830"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2150976.2150992"},{"key":"e_1_3_2_2_11_1","volume-title":"USENIX ATC'08","author":"Ford B.","unstructured":"B. Ford and R. Cox . Vx32: lightweight user-level sand-boxing on the x86 . In USENIX ATC'08 . B. Ford and R. Cox. Vx32: lightweight user-level sand-boxing on the x86. In USENIX ATC'08."},{"key":"e_1_3_2_2_12_1","volume-title":"USENIX Security '02","author":"Kiriansky V.","unstructured":"V. Kiriansky , D. Bruening , and S. Amarasinghe . Secure execution via program shepherding . In USENIX Security '02 . V. Kiriansky, D. Bruening, and S. Amarasinghe. Secure execution via program shepherding. In USENIX Security '02."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254128"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273442.1250746"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1272996.1273000"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89862-7_1"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/223982.223990"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1952682.1952688"},{"key":"e_1_3_2_2_20_1","unstructured":"Q. Zhao R. Rabbah S. Amarasinghe L. Rudolph and W.-F. Wong. How to do a million watchpoints: efficient debugging using dynamic instrumentation. In CC'08\/ETAPS'08.   Q. Zhao R. Rabbah S. Amarasinghe L. Rudolph and W.-F. Wong. How to do a million watchpoints: efficient debugging using dynamic instrumentation. In CC'08\/ETAPS'08 ."}],"event":{"name":"SOSP '13: ACM SIGOPS 24th Symposium on Operating Systems Principles","location":"Farminton Pennsylvania","acronym":"SOSP '13","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2517349.2522718","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2517349.2522718","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:28:53Z","timestamp":1750231733000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2517349.2522718"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11,3]]},"references-count":19,"alternative-id":["10.1145\/2517349.2522718","10.1145\/2517349"],"URL":"https:\/\/doi.org\/10.1145\/2517349.2522718","relation":{},"subject":[],"published":{"date-parts":[[2013,11,3]]},"assertion":[{"value":"2013-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}