{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:47:54Z","timestamp":1772164074159,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,3,25]],"date-time":"2017-03-25T00:00:00Z","timestamp":1490400000000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["0524096"],"award-info":[{"award-number":["0524096"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["FA8750-10-C-0242"],"award-info":[{"award-number":["FA8750-10-C-0242"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,25]]},"DOI":"10.1145\/2892242.2892257","type":"proceedings-article","created":{"date-parts":[[2016,3,28]],"date-time":"2016-03-28T09:24:30Z","timestamp":1459157070000},"page":"93-106","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Abstractions for Practical Virtual Machine Replay"],"prefix":"10.1145","author":[{"given":"Anton","family":"Burtsev","sequence":"first","affiliation":[{"name":"University of Utah, Salt Lake City, UT, USA"}]},{"given":"David","family":"Johnson","sequence":"additional","affiliation":[{"name":"University of Utah, Salt Lake City, UT, USA"}]},{"given":"Mike","family":"Hibler","sequence":"additional","affiliation":[{"name":"University of Utah, Salt Lake City, UT, USA"}]},{"given":"Eric","family":"Eide","sequence":"additional","affiliation":[{"name":"University of Utah, Salt Lake City, UT, USA"}]},{"given":"John","family":"Regehr","sequence":"additional","affiliation":[{"name":"University of Utah, Salt Lake City, UT, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,3,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629594"},{"key":"e_1_3_2_1_2_1","unstructured":"Amazon Web Services Inc. Amazon EC2 -- virtual server hosting 2016. URL https:\/\/aws.amazon.com\/ec2\/."},{"key":"e_1_3_2_1_3_1","volume-title":"AMD64 Architecture Programmer's Manual Volume 2: System Programming","author":"0AMD Corporation","year":"2007","unstructured":"0AMD Corporation. AMD64 Architecture Programmer's Manual Volume 2: System Programming, 2007."},{"key":"e_1_3_2_1_4_1","volume-title":"Proc. OSDI","author":"Attariyan M.","year":"2012","unstructured":"M. Attariyan, M. Chow, and J. Flinn. X-ray: Automating root-cause diagnosis of performance anomalies in production software. In Proc. OSDI, Oct. 2012. URL https:\/\/www.usenix.org\/conference\/osdi12\/technical-sessions\/presentation\/attariyan."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945462"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/800216.806587"},{"key":"e_1_3_2_1_7_1","first-page":"177","volume-title":"Proc. OSDI","author":"Bergan T.","year":"2010","unstructured":"T. Bergan, N. Hunt, L. Ceze, and S. D. Gribble. Deterministic process groups in dOS. In Proc. OSDI, pages 177--192, Oct. 2010. URL https:\/\/www.usenix.org\/legacy\/event\/osdi10\/tech\/full_papers\/Bergan.pdf."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/800217.806617"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/224056.224058"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/36206.36187"},{"key":"e_1_3_2_1_11_1","first-page":"541","volume-title":"Proc. OSDI","author":"Chen A.","year":"2014","unstructured":"A. Chen, W. B. Moore, H. Xiao, A. Haeberlen, L. T. X. an, M. Sherr, and W. Zhou. Detecting covert timing channels with time-deterministic replay. In Proc. OSDI, pages 541--554, Oct. 2014. URL https:\/\/www.usenix.org\/conference\/osdi14\/technical-sessions\/presentation\/chen_ang."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2442516.2442537"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2790077"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1407351"},{"key":"e_1_3_2_1_15_1","first-page":"1","volume-title":"Proc. USENIX ATC","author":"Chow J.","year":"2008","unstructured":"J. Chow, T. Garfinkel, and P. M. Chen. Decoupling dynamic program analysis from execution in virtual environments. In Proc. USENIX ATC, pages 1--14, June 2008. URL https:\/\/www.usenix.org\/legacy\/event\/usenix08\/tech\/full_papers\/chow\/chow.pdf."},{"key":"e_1_3_2_1_16_1","volume-title":"International Conference on Advances in Infrastructure for Electronic Business, Education, Science, Medicine, and Mobile Technologies on the Internet","author":"Cornelis F.","year":"2003","unstructured":"F. Cornelis, A. Georges, M. Christiaens, M. Ronsse, T. Ghesquiere, and K. D. Bosschere. A taxonomy of execution replay systems. In International Conference on Advances in Infrastructure for Electronic Business, Education, Science, Medicine, and Mobile Technologies on the Internet, 2003."},{"key":"e_1_3_2_1_17_1","volume-title":"Proc. PDPTA","author":"Cornelis F.","unstructured":"F. Cornelis, M. Ronsse, and K. De Bosschere. TORNADO: A novel input replay tool. In Proc. PDPTA, 2003\\natexlabb."},{"key":"e_1_3_2_1_18_1","first-page":"394","volume-title":"Proc. ICDCS","author":"Curtis R.","year":"1982","unstructured":"R. Curtis and L. D. Wittie. BUGNET: A debugging system for parallel programming environments. In Proc. ICDCS, pages 394--400, Oct. 1982."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1181309.1181320"},{"key":"e_1_3_2_1_20_1","volume-title":"Proc. PDPTA","author":"Dionne C.","year":"1996","unstructured":"C. Dionne, M. Feeley, and J. Desbiens. A taxonomy of distributed debuggers based on execution replay. In Proc. PDPTA, Aug. 1996."},{"key":"e_1_3_2_1_21_1","volume-title":"Personal communication","author":"Dunlap G.","year":"2012","unstructured":"G. Dunlap. Personal communication, 2012."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060309"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346256.1346273"},{"key":"e_1_3_2_1_24_1","volume-title":"Execution Replay for Intrusion Analysis. D thesis","author":"G. W.","year":"2006","unstructured":"G. W. Dunlap III. Execution Replay for Intrusion Analysis. D thesis, University of Michigan, 2006."},{"key":"e_1_3_2_1_25_1","volume-title":"Proc. 1st Workshop on Operating System and Architectural Support for the On Demand IT Infrastructure (OASIS)","author":"Fraser K.","year":"2004","unstructured":"K. Fraser, S. Hand, R. Neugebauer, I. Pratt, A. Warfield, and M. Williamson. Safe hardware access with the Xen virtual machine monitor. In Proc. 1st Workshop on Operating System and Architectural Support for the On Demand IT Infrastructure (OASIS), Oct. 2004. URL https:\/\/www.cl.cam.ac.uk\/research\/srg\/netos\/papers\/2004-safehw-oasis.pdf."},{"key":"e_1_3_2_1_26_1","first-page":"289","volume-title":"Proc. USENIX ATC","author":"Geels D.","year":"2006","unstructured":"D. Geels, G. Altekar, S. Shenker, and I. Stoica. Replay debugging for distributed applications. In Proc. USENIX ATC, pages 289--300, May--June 2006. URL https:\/\/www.usenix.org\/legacy\/events\/usenix06\/tech\/geels.html."},{"key":"e_1_3_2_1_27_1","first-page":"193","volume-title":"Proc. OSDI","author":"Guo Z.","year":"2008","unstructured":"Z. Guo, X. Wang, J. Tang, X. Liu, Z. Xu, M. Wu, M. F. Kaashoek, and Z. Zhang. R2: An application-level kernel for record and replay. In Proc. OSDI, pages 193--208, Dec. 2008. URL https:\/\/www.usenix.org\/legacy\/events\/osdi08\/tech\/full_papers\/guo\/guo.pdf."},{"key":"e_1_3_2_1_28_1","first-page":"119","volume-title":"Proc. OSDI","author":"Haeberlen A.","year":"2010","unstructured":"A. Haeberlen, P. Aditya, R. Rodrigues, and P. Druschel. Accountable virtual machines. In Proc. OSDI, pages 119--134, Oct. 2010. URL https:\/\/www.usenix.org\/legacy\/event\/osdi10\/tech\/full_papers\/Haeberlen.pdf."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541979"},{"key":"e_1_3_2_1_30_1","unstructured":"J. Huselius. Debugging parallel systems: A state of the art report. MTRC Report 63 Malardalens University Vaster's Sweden Sept. 2002. URL http:\/\/www.es.mdh.se\/publications\/366-Debugging_Parallel_Systems__A_State_of_the_Art_Report."},{"key":"e_1_3_2_1_31_1","volume-title":"Intel 64 and IA-32 Architectures Software Developer's Manual","author":"Intel Corporation","year":"2015","unstructured":"Intel Corporation. Intel 64 and IA-32 Architectures Software Developer's Manual, Volume 3 (3A, 3B, 3C, and 3D): System Programming Guide, 2015."},{"key":"e_1_3_2_1_32_1","first-page":"1","volume-title":"Proc. USENIX ATC","author":"King S. T.","year":"2005","unstructured":"S. T. King, G. W. Dunlap, and P. M. Chen. Debugging operating systems with time-traveling virtual machines. In Proc. USENIX ATC, pages 1--15, Apr. 2005. URL https:\/\/www.usenix.org\/legacy\/events\/usenix05\/tech\/general\/king.html."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1811039.1811057"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/5001.5005"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2151024.2151044"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/70082.68189"},{"key":"e_1_3_2_1_37_1","volume-title":"Feb.","author":"Foundation Mozilla","year":"2016","unstructured":"Mozilla Foundation. rr: lightweight recording & deterministic debugging, Feb. 2016. URL http:\/\/rr-project.org\/."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629593"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1400097.1400108"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1085130.1085139"},{"key":"e_1_3_2_1_41_1","first-page":"29","volume-title":"Proc. USENIX ATC","author":"Srinivasan S. M.","year":"2004","unstructured":"S. M. Srinivasan, S. Kandula, C. R. Andrews, and Y. Zhou. Flashback: A lightweight extension for rollback and deterministic replay for software debugging. In Proc. USENIX ATC, pages 29--44, June--July 2004. URL https:\/\/www.usenix.org\/legacy\/event\/usenix04\/tech\/general\/srinivasan.html."},{"key":"e_1_3_2_1_42_1","volume-title":"Nov.","author":"Venkitachalam G.","year":"2010","unstructured":"G. Venkitachalam, M. Nelson, B. Weissman, M. Xu, and V. V. Malyugin. Using branch instruction counts to facilitate replay of virtual machine instruction execution. U.S. patent 7,844,954, Nov. 2010."},{"key":"e_1_3_2_1_43_1","volume-title":"Aug.","year":"2009","unstructured":"VMware. VMware vSere 4 Fault Tolerance: Architecture and performance. White paper, Aug. 2009. URL https:\/\/www.vmware.com\/resources\/techresources\/10058."},{"key":"e_1_3_2_1_44_1","volume-title":"Aug.","year":"2012","unstructured":"VMware. Protecting Hadoop with VMware vSere 5 Fault Tolerance. Technical white paper, Aug. 2012. URL https:\/\/www.vmware.com\/resources\/techresources\/10301."},{"key":"e_1_3_2_1_45_1","volume-title":"Dec.","year":"2015","unstructured":"VMware. VMware vSere 6 Fault Tolerance: Architecture and performance. Technical white paper, Dec. 2015. URL https:\/\/www.vmware.com\/resources\/techresources\/10514."},{"key":"e_1_3_2_1_46_1","volume-title":"May","author":"Weissman B.","year":"2015","unstructured":"B. Weissman, V. V. Malyugin, P. Vandrovec, G. Venkitachalam, and M. Xu. Precise branch counting in virtualization systems. U.S. patent 9,027,003, May 2015."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060313"},{"key":"e_1_3_2_1_48_1","volume-title":"Proc. 3rd Annual Workshop on Modeling, Benchmarking and Simulation","author":"Xu M.","year":"2007","unstructured":"M. Xu, V. Malyugin, J. Sheldon, G. Venkitachalam, and B. Weissman. ReTrace: Collecting execution trace with virtual machine deterministic replay. In Proc. 3rd Annual Workshop on Modeling, Benchmarking and Simulation, June 2007. URL https:\/\/labs.vmware.com\/academic\/publications\/retrace."}],"event":{"name":"VEE '16: 12th ACM SIGPLAN\/SIGOPS International Conference on Virtual Execution Environments","location":"Atlanta Georgia USA","acronym":"VEE '16","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the12th ACM SIGPLAN\/SIGOPS International Conference on Virtual Execution Environments"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2892242.2892257","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2892242.2892257","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2892242.2892257","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:36:06Z","timestamp":1763458566000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2892242.2892257"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,25]]},"references-count":48,"alternative-id":["10.1145\/2892242.2892257","10.1145\/2892242"],"URL":"https:\/\/doi.org\/10.1145\/2892242.2892257","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/3007611.2892257","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2016,3,25]]},"assertion":[{"value":"2016-03-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}