{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:47:18Z","timestamp":1772164038940,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,3,14]],"date-time":"2015-03-14T00:00:00Z","timestamp":1426291200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100006785","name":"Google","doi-asserted-by":"publisher","award":["Google Europe Fellowship in Software Engineering"],"award-info":[{"award-number":["Google Europe Fellowship in Software Engineering"]}],"id":[{"id":"10.13039\/100006785","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["Early-Career Fellowship EP\/L002795\/1"],"award-info":[{"award-number":["Early-Career Fellowship EP\/L002795\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,3,14]]},"DOI":"10.1145\/2694344.2694390","type":"proceedings-article","created":{"date-parts":[[2015,3,3]],"date-time":"2015-03-03T09:15:23Z","timestamp":1425374123000},"page":"339-353","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":44,"title":["VARAN the Unbelievable"],"prefix":"10.1145","author":[{"given":"Petr","family":"Hosek","sequence":"first","affiliation":[{"name":"Imperial College London, London, United Kingdom"}]},{"given":"Cristian","family":"Cadar","sequence":"additional","affiliation":[{"name":"Imperial College London, London, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2015,3,14]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proc. of the 9th USENIX Security Symposium (USENIX Security'00)","author":"Acharya A.","year":"2000"},{"key":"e_1_3_2_1_2_1","unstructured":"A. Alexandrov P. Kmiec and K. Schauser. Consh: Confined execution environment for Internet computations. http:\/\/itslab.inf.kyushu-u.ac.jp\/ssr\/Links\/alexandrov98consh.pdf Dec. 1998.  A. Alexandrov P. Kmiec and K. Schauser. Consh: Confined execution environment for Internet computations. http:\/\/itslab.inf.kyushu-u.ac.jp\/ssr\/Links\/alexandrov98consh.pdf Dec. 1998."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2007.443"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736029"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134000"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2007.111"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2007.358924"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/2664350.2664358"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882362.1882380"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2008.50"},{"key":"e_1_3_2_1_11_1","volume-title":"Proc. of the 8th IEEE International Symposium on Fault Tolerant Computing (FTCS'78)","author":"Chen L.","year":"1978"},{"key":"e_1_3_2_1_12_1","unstructured":"Chromium.org. Linux Zygote: The use of zygotes on Linux. https:\/\/code.google.com\/p\/chromium\/wiki\/LinuxZygote.  Chromium.org. Linux Zygote: The use of zygotes on Linux. https:\/\/code.google.com\/p\/chromium\/wiki\/LinuxZygote."},{"key":"e_1_3_2_1_13_1","volume-title":"Proc. of the 15th USENIX Security Symposium (USENIX Security'06)","author":"Cox B.","year":"2006"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.15"},{"key":"e_1_3_2_1_15_1","volume-title":"Proc. of the 2002 Ottawa Linux Symposium (OLS'02)","author":"Franke H.","year":"2002"},{"key":"e_1_3_2_1_16_1","volume-title":"Proc. of the 11th Network and Distributed System Security Symposium (NDSS'04)","author":"Garfinkel T.","year":"2004"},{"key":"e_1_3_2_1_17_1","volume-title":"Proc. of the 2006 USENIX Annual Technical Conference (USENIX ATC'06)","author":"Geels D.","year":"2006"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1345206.1345215"},{"key":"e_1_3_2_1_19_1","volume-title":"Proc. of the 6th USENIX Security Symposium (USENIX Security'96)","author":"Goldberg I.","year":"1996"},{"key":"e_1_3_2_1_20_1","volume-title":"Proc. of the 8th USENIX Symposium on Operating Systems Design and Implementation (OSDI'08)","author":"Guo Z.","year":"2008"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486869"},{"key":"e_1_3_2_1_22_1","volume-title":"Proc. of the 3rd USENIX Windows NT Symposium (USENIX NT'99)","author":"Hunt G.","year":"1999"},{"key":"e_1_3_2_1_23_1","volume-title":"Proc. of the 6th Network and Distributed System Security Symposium (NDSS'99)","author":"Jain K.","year":"1999"},{"key":"e_1_3_2_1_24_1","volume-title":"Memory characterization of workloads using instrumentation-driven simulation. Technical report","author":"Jaleel A.","year":"2007"},{"key":"e_1_3_2_1_25_1","volume-title":"Proc. of the 2013 USENIX Annual Technical Conference (USENIX ATC'13)","author":"Kim T.","year":"2013"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/647253.720293"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1811039.1811057"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/359545.359563"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2010.5470368"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/EMPDP.1994.592529"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043587"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"e_1_3_2_1_33_1","volume-title":"Proc. of the 21st USENIX Security Symposium (USENIX Security'12)","author":"Maurer M.","year":"2012"},{"key":"e_1_3_2_1_34_1","volume-title":"Proc. of the 1993 Winter USENIX Conference","author":"McCanne S.","year":"1993"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2006.6"},{"key":"e_1_3_2_1_36_1","volume-title":"Proc. of the 11th USENIX Security Symposium (USENIX Security'02)","author":"Provos N.","year":"2002"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133375.2133377"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/312203.312214"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1085130.1085139"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1519065.1519071"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.5555\/1323140.1323146"},{"key":"e_1_3_2_1_42_1","volume-title":"LMAX","author":"Thompson M.","year":"2011"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508267"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043590"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/0950-5849(90)90044-R"},{"key":"e_1_3_2_1_47_1","volume-title":"Proc. of the 19th Network and Distributed System Security Symposium (NDSS'12)","author":"Xue H.","year":"2012"},{"key":"e_1_3_2_1_48_1","volume-title":"Proc. of the 4th USENIX Symposium on Networked Systems Design and Implementation (NSDI'07)","author":"Yumerefendi A. R.","year":"2007"}],"event":{"name":"ASPLOS '15: Architectural Support for Programming Languages and Operating Systems","location":"Istanbul Turkey","acronym":"ASPLOS '15","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2694344.2694390","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2694344.2694390","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:12:20Z","timestamp":1750212740000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2694344.2694390"}},"subtitle":["An Efficient N-version Execution Framework"],"short-title":[],"issued":{"date-parts":[[2015,3,14]]},"references-count":47,"alternative-id":["10.1145\/2694344.2694390","10.1145\/2694344"],"URL":"https:\/\/doi.org\/10.1145\/2694344.2694390","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2786763.2694390","asserted-by":"object"},{"id-type":"doi","id":"10.1145\/2775054.2694390","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2015,3,14]]},"assertion":[{"value":"2015-03-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}