{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T16:11:44Z","timestamp":1774627904156,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,11,3]],"date-time":"2014-11-03T00:00:00Z","timestamp":1414972800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,11,3]]},"DOI":"10.1145\/2670979.2670986","type":"proceedings-article","created":{"date-parts":[[2014,11,7]],"date-time":"2014-11-07T17:10:54Z","timestamp":1415380254000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":126,"title":["What Bugs Live in the Cloud? A Study of 3000+ Issues in Cloud Systems"],"prefix":"10.1145","author":[{"given":"Haryadi S.","family":"Gunawi","sequence":"first","affiliation":[{"name":"University of Chicago"}]},{"given":"Mingzhe","family":"Hao","sequence":"additional","affiliation":[{"name":"University of Chicago"}]},{"given":"Tanakorn","family":"Leesatapornwongsa","sequence":"additional","affiliation":[{"name":"University of Chicago"}]},{"given":"Tiratat","family":"Patana-anake","sequence":"additional","affiliation":[{"name":"University of Chicago"}]},{"given":"Thanh","family":"Do","sequence":"additional","affiliation":[{"name":"University of Wisconsin--Madison"}]},{"given":"Jeffry","family":"Adityatama","sequence":"additional","affiliation":[{"name":"Surya University"}]},{"given":"Kurnia J.","family":"Eliazar","sequence":"additional","affiliation":[{"name":"Surya University"}]},{"given":"Agung","family":"Laksono","sequence":"additional","affiliation":[{"name":"Surya University"}]},{"given":"Jeffrey F.","family":"Lukman","sequence":"additional","affiliation":[{"name":"Surya University"}]},{"given":"Vincentius","family":"Martin","sequence":"additional","affiliation":[{"name":"Surya University"}]},{"given":"Anang D.","family":"Satria","sequence":"additional","affiliation":[{"name":"Surya University"}]}],"member":"320","published-online":{"date-parts":[[2014,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Apache Cassandra Project. http:\/\/cassandra.apache.org.  Apache Cassandra Project. http:\/\/cassandra.apache.org."},{"key":"e_1_3_2_1_2_1","unstructured":"Apache Flume Project. http:\/\/flume.apache.org.  Apache Flume Project. http:\/\/flume.apache.org."},{"key":"e_1_3_2_1_3_1","unstructured":"Apache Hadoop Project. http:\/\/hadoop.apache.org.  Apache Hadoop Project. http:\/\/hadoop.apache.org."},{"key":"e_1_3_2_1_4_1","unstructured":"Apache HBase Project. http:\/\/hadoop.apache.org\/hbase.  Apache HBase Project. http:\/\/hadoop.apache.org\/hbase."},{"key":"e_1_3_2_1_5_1","unstructured":"Apache ZooKeeper Project. http:\/\/zookeeper.apache.org.  Apache ZooKeeper Project. http:\/\/zookeeper.apache.org."},{"key":"e_1_3_2_1_6_1","unstructured":"HDFS Architecture. http:\/\/hadoop.apache.org\/docs\/current\/hadoop-project-dist\/hadoop-hdfs\/HdfsDesign.html.  HDFS Architecture. http:\/\/hadoop.apache.org\/docs\/current\/hadoop-project-dist\/hadoop-hdfs\/HdfsDesign.html."},{"key":"e_1_3_2_1_7_1","unstructured":"The 10 Biggest Cloud Outages Of 2013. http:\/\/www.crn.com\/slide-shows\/cloud\/240165024\/the-10-biggest-cloud-outages-of-2013.htm.  The 10 Biggest Cloud Outages Of 2013. http:\/\/www.crn.com\/slide-shows\/cloud\/240165024\/the-10-biggest-cloud-outages-of-2013.htm."},{"key":"e_1_3_2_1_8_1","unstructured":"The Apache Software Foundation. http:\/\/www.apache.org\/.  The Apache Software Foundation. http:\/\/www.apache.org\/."},{"key":"e_1_3_2_1_9_1","unstructured":"The Cloud Bug Study (CBS) Project. http:\/\/ucare.cs.uchicago.edu\/projects\/cbs.  The Cloud Bug Study (CBS) Project. http:\/\/ucare.cs.uchicago.edu\/projects\/cbs."},{"key":"e_1_3_2_1_10_1","volume-title":"Attariyan and Jason Flinn. Automating Configuration Troubleshooting with Dynamic Information Flow Analysis. In OSDI '10","author":"Mona"},{"key":"e_1_3_2_1_11_1","volume-title":"Arpaci-Dusseau. An Analysis of Data Corruption in the Storage Stack. In FAST '08","author":"Bairavasundaram Lakshmi N."},{"key":"e_1_3_2_1_12_1","unstructured":"Cory Bennett and Ariel Tseitlin. Chaos Monkey Released Into The Wild. http:\/\/techblog.netflix.com 2012.  Cory Bennett and Ariel Tseitlin. Chaos Monkey Released Into The Wild. http:\/\/techblog.netflix.com 2012."},{"key":"e_1_3_2_1_13_1","volume-title":"OSDI '06","author":"Burrows Mike"},{"key":"e_1_3_2_1_14_1","volume-title":"Robert Gruber. Bigtable: A Distributed Storage System for Structured Data. In OSDI '06","author":"Chang Fay"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502042"},{"key":"e_1_3_2_1_16_1","volume-title":"Marco Serafini. Practical Hardening of Crash-Tolerant Systems. In USENIX ATC '12","author":"Correia Miguel"},{"key":"e_1_3_2_1_17_1","unstructured":"Jeffrey Dean. Underneath the Covers at Google: Current Systems and Future Directions. In Google I\/O '08.  Jeffrey Dean. Underneath the Covers at Google: Current Systems and Future Directions. In Google I\/O '08."},{"key":"e_1_3_2_1_18_1","volume-title":"Dean and Sanjay Ghemawat. MapReduce: Simplified Data Processing on Large Clusters. In OSDI '04","author":"Jeffrey"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294281"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523616.2523627"},{"key":"e_1_3_2_1_21_1","volume-title":"Arpaci-Dusseau. HARDFS: Hardening HDFS with Selective and Lightweight Versioning. In FAST '13","author":"Do Thanh"},{"key":"e_1_3_2_1_22_1","volume-title":"NSDI '13","author":"Fan Bin"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945450"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451142"},{"key":"e_1_3_2_1_25_1","volume-title":"Dhruba Borthakur. Fate and Destini: A Framework for Cloud Recovery Testing. In NSDI '11","author":"Gunawi Haryadi S."},{"key":"e_1_3_2_1_26_1","volume-title":"FAST '08","author":"Gunawi Haryadi S."},{"key":"e_1_3_2_1_27_1","volume-title":"Li Zhuang. Nectar: Automatic Management of Data and Computation in Datacenters. In OSDI '10","author":"Gunda Pradeep Kumar"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043582"},{"key":"e_1_3_2_1_29_1","volume-title":"HotOS XIV","author":"Guo Zhenyu","year":"2013"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2038916.2038934"},{"key":"e_1_3_2_1_31_1","volume-title":"Ion Stoica. Mesos: A Platform for Fine-Grained Resource Sharing in the Data Center. In NSDI '11","author":"Hindman Benjamin"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2670979.2670992"},{"key":"e_1_3_2_1_33_1","volume-title":"Gunawi. SAMC: Semantic-Aware Model Checking for Fast Discovery of Deep Bugs in Cloud Systems. In OSDI '14","author":"Leesatapornwongsa Tanakorn"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043583"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2670979.2671004"},{"key":"e_1_3_2_1_36_1","volume-title":"February","author":"Lipcon Todd","year":"2011"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043593"},{"key":"e_1_3_2_1_38_1","volume-title":"Shan Lu. A Study of Linux File System Evolution. In FAST '13","author":"Lu Lanyue"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346323"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522738"},{"key":"e_1_3_2_1_41_1","volume-title":"Yutaka Suzue. Flat Datacenter Storage. In OSDI '12","author":"Nightingale Edmund B."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100053"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2367376.2371297"},{"key":"e_1_3_2_1_44_1","volume-title":"John Ousterhout. Log-structured Memory for DRAM-based Storage. In FAST '14","author":"Rumble Stephen M."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1555349.1555372"},{"key":"e_1_3_2_1_46_1","volume-title":"Anees Shaikh. Performance Isolation and Fairness for Multi-Tenant Cloud Storage. In OSDI '12","author":"Shue David"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522731"},{"key":"e_1_3_2_1_48_1","volume-title":"Eric Baldeschwieler. Apache Hadoop YARN: Yet Another Resource Negotiator. In SoCC '13","author":"Vavilapalli Vinod Kumar"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2391229.2391243"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352592.1352612"},{"key":"e_1_3_2_1_51_1","volume-title":"Scott Mahlke. Gadara: Dynamic Deadlock Avoidance for Multithreaded Programs. In OSDI '08","author":"Wang Yin"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522727"},{"key":"e_1_3_2_1_53_1","volume-title":"Lidong Zhou. MODIST: Transparent Model Checking of Unmodified Distributed Systems. In NSDI '09","author":"Yang Junfeng"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043572"},{"key":"e_1_3_2_1_55_1","volume-title":"Michael Stumm. Simple Testing Can Prevent Most Critical Failures: An Analysis of Production Failures in Distributed Dataintensive Systems. In OSDI '14","author":"Yuan Ding"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522729"}],"event":{"name":"SOCC '14: ACM Symposium on Cloud Computing","location":"Seattle WA USA","acronym":"SOCC '14","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the ACM Symposium on Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2670979.2670986","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2670979.2670986","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:18Z","timestamp":1750227138000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2670979.2670986"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,3]]},"references-count":56,"alternative-id":["10.1145\/2670979.2670986","10.1145\/2670979"],"URL":"https:\/\/doi.org\/10.1145\/2670979.2670986","relation":{},"subject":[],"published":{"date-parts":[[2014,11,3]]},"assertion":[{"value":"2014-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}