{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T05:15:21Z","timestamp":1755926121367,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":96,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,14]],"date-time":"2017-10-14T00:00:00Z","timestamp":1507939200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,14]]},"DOI":"10.1145\/3132747.3132760","type":"proceedings-article","created":{"date-parts":[[2017,10,12]],"date-time":"2017-10-12T12:51:09Z","timestamp":1507812669000},"page":"546-564","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["The Efficient Server Audit Problem, Deduplicated Re-execution, and the Web"],"prefix":"10.1145","author":[{"given":"Cheng","family":"Tan","sequence":"first","affiliation":[{"name":"NYU Department of Computer Science, Courant Institute"}]},{"given":"Lingfan","family":"Yu","sequence":"additional","affiliation":[{"name":"NYU Department of Computer Science, Courant Institute"}]},{"given":"Joshua B.","family":"Leners","sequence":"additional","affiliation":[{"name":"Two Sigma Investments"}]},{"given":"Michael","family":"Walfish","sequence":"additional","affiliation":[{"name":"NYU Department of Computer Science, Courant Institute"}]}],"member":"320","published-online":{"date-parts":[[2017,10,14]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Amazon Web Services (AWS). https:\/\/aws.amazon.com\/.  Amazon Web Services (AWS). https:\/\/aws.amazon.com\/."},{"key":"e_1_3_2_2_2_1","unstructured":"CentOS forum. https:\/\/www.centos.org\/forums\/.  CentOS forum. https:\/\/www.centos.org\/forums\/."},{"key":"e_1_3_2_2_3_1","unstructured":"LAMP (software bundle). https:\/\/en.wikipedia.org\/wiki\/LAMP_(software_bundle).  LAMP (software bundle). https:\/\/en.wikipedia.org\/wiki\/LAMP_(software_bundle)."},{"key":"e_1_3_2_2_4_1","unstructured":"PHP manual. http:\/\/php.net\/manual\/en\/index.php.  PHP manual. http:\/\/php.net\/manual\/en\/index.php."},{"key":"e_1_3_2_2_5_1","unstructured":"SIMD. https:\/\/en.wikipedia.org\/wiki\/SIMD.  SIMD. https:\/\/en.wikipedia.org\/wiki\/SIMD."},{"key":"e_1_3_2_2_6_1","unstructured":"Transaction isolation levels. https:\/\/dev.mysql.com\/doc\/refman\/5.6\/en\/innodb-transaction-isolation-levels.html.  Transaction isolation levels. https:\/\/dev.mysql.com\/doc\/refman\/5.6\/en\/innodb-transaction-isolation-levels.html."},{"key":"e_1_3_2_2_7_1","unstructured":"A virtual machine designed for executing programs written in Hack and PHP. https:\/\/github.com\/facebook\/hhvm.  A virtual machine designed for executing programs written in Hack and PHP. https:\/\/github.com\/facebook\/hhvm."},{"key":"e_1_3_2_2_8_1","unstructured":"The process of ACM Sigcomm 2009. http\/\/:www.sigcomm.org\/conference-planning\/the-process-of-acm-sigcomm-2009.  The process of ACM Sigcomm 2009. http\/\/:www.sigcomm.org\/conference-planning\/the-process-of-acm-sigcomm-2009."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08867-9_33"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/2032305.2032311"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629594"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134104"},{"key":"e_1_3_2_2_13_1","volume-title":"USENIX Workshop on Hot Topics in System Dependability (HotDep)","author":"Anderson E.","year":"2010","unstructured":"E. Anderson , X. Li , M. A. Shah , J. Tucek , and J. J. Wylie . What consistency does your key-value store actually provide ? In USENIX Workshop on Hot Topics in System Dependability (HotDep) , Oct. 2010 . Full version: Technical Report HPL- 2010-98, Hewlett-Packard Laboratories, 2010. E. Anderson, X. Li, M. A. Shah, J. Tucek, and J. J. Wylie. What consistency does your key-value store actually provide? In USENIX Workshop on Hot Topics in System Dependability (HotDep), Oct. 2010. Full version: Technical Report HPL-2010-98, Hewlett-Packard Laboratories, 2010."},{"key":"e_1_3_2_2_14_1","volume-title":"Symposium on Operating Systems Design and Implementation (OSDI)","author":"Arnautov S.","year":"2016","unstructured":"S. Arnautov , B. Trach , F. Gregor , T. Knauth , A. Martin , C. Priebe , J. Lind , D. Muthukumaran , D. O'Keeffe , M. L. Stillwell , D. Goltzsche , D. Eyers , R. Kapitza , P. Pietzuch , and C. Fetzer . SCONE: Secure Linux containers with Intel SGX . In Symposium on Operating Systems Design and Implementation (OSDI) , Nov. 2016 . S. Arnautov, B. Trach, F. Gregor, T. Knauth, A. Martin, C. Priebe, J. Lind, D. Muthukumaran, D. O'Keeffe, M. L. Stillwell, D. Goltzsche, D. Eyers, R. Kapitza, P. Pietzuch, and C. Fetzer. SCONE: Secure Linux containers with Intel SGX. In Symposium on Operating Systems Design and Implementation (OSDI), Nov. 2016."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/103418.103428"},{"key":"e_1_3_2_2_16_1","volume-title":"Sept.","author":"Bailis P.","year":"2014","unstructured":"P. Bailis . Linearizability versus serializability. http\/\/:www.bailis.org\/blog\/linearizability-versus-serializability\/ , Sept. 2014 . P. Bailis. Linearizability versus serializability. http\/\/:www.bailis.org\/blog\/linearizability-versus-serializability\/, Sept. 2014."},{"key":"e_1_3_2_2_17_1","volume-title":"Symposium on Operating Systems Design and Implementation (OSDI)","author":"Baumann A.","year":"2014","unstructured":"A. Baumann , M. Peinado , and G. Hunt . Shielding applications from an untrusted cloud with Haven . In Symposium on Operating Systems Design and Implementation (OSDI) , Oct. 2014 . A. Baumann, M. Peinado, and G. Hunt. Shielding applications from an untrusted cloud with Haven. In Symposium on Operating Systems Design and Implementation (OSDI), Oct. 2014."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56617-7_19"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40084-1_6"},{"key":"e_1_3_2_2_20_1","volume-title":"USENIX Security","author":"Ben-Sasson E.","year":"2014","unstructured":"E. Ben-Sasson , A. Chiesa , E. Tromer , and M. Virza . Succinct non-interactive zero knowledge for a von Neumann architecture . In USENIX Security , Aug. 2014 . E. Ben-Sasson, A. Chiesa, E. Tromer, and M. Virza. Succinct non-interactive zero knowledge for a von Neumann architecture. In USENIX Security, Aug. 2014."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1979.234182"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694371"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522733"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/225535.225538"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043567"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451512.2451546"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346284"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2442516.2442537"},{"key":"e_1_3_2_2_30_1","volume-title":"Ars Technica","author":"Cheng J.","year":"2008","unstructured":"J. Cheng . NebuAd , ISPs sued over DPI snooping, ad-targeting program . Ars Technica , Nov. 2008 . https:\/\/arstechnica.com\/tech-policy\/2008\/11\/nebuad-isps-sued-over-dpi-snooping-ad-targeting-program\/. J. Cheng. NebuAd, ISPs sued over DPI snooping, ad-targeting program. Ars Technica, Nov. 2008. https:\/\/arstechnica.com\/tech-policy\/2008\/11\/nebuad-isps-sued-over-dpi-snooping-ad-targeting-program\/."},{"key":"e_1_3_2_2_31_1","volume-title":"Introduction to Algorithms","author":"Cormen T. H.","year":"2009","unstructured":"T. H. Cormen , C. E. Leiserson , R. L. Rivest , and C. Stein . Introduction to Algorithms , third edition. The MIT Press , Cambridge, MA , 2009 . T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein. Introduction to Algorithms, third edition. The MIT Press, Cambridge, MA, 2009."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090245"},{"key":"e_1_3_2_2_33_1","volume-title":"International Conference on Advances in Infrastructure for Electronic Business, Education, Science, Medicine, and Mobile Technologies on the Internet","author":"Cornelis F.","year":"2003","unstructured":"F. Cornelis , A. Georges , M. Christiaens , M. Ronsse , T. Ghesquiere , and K. D. Bosschere . A taxonomy of execution replay systems . In International Conference on Advances in Infrastructure for Electronic Business, Education, Science, Medicine, and Mobile Technologies on the Internet , 2003 . F. Cornelis, A. Georges, M. Christiaens, M. Ronsse, T. Ghesquiere, and K. D. Bosschere. A taxonomy of execution replay systems. In International Conference on Advances in Infrastructure for Electronic Business, Education, Science, Medicine, and Mobile Technologies on the Internet, 2003."},{"key":"e_1_3_2_2_34_1","volume-title":"Proceedings of the International Conference on Parallel and Distributed Processing Techniques (PDPTA)","author":"Dionne C.","year":"1996","unstructured":"C. Dionne , M. Feeley , and J. Desbiens . A taxonomy of distributed debuggers based on execution replay . In Proceedings of the International Conference on Parallel and Distributed Processing Techniques (PDPTA) , Aug. 1996 . C. Dionne, M. Feeley, and J. Desbiens. A taxonomy of distributed debuggers based on execution replay. In Proceedings of the International Conference on Parallel and Distributed Processing Techniques (PDPTA), Aug. 1996."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060309"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346256.1346273"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/1881412.1881445"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_37"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539794279614"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368506.1368511"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993806.1993834"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699436"},{"key":"e_1_3_2_2_43_1","volume-title":"Symposium on Operating Systems Design and Implementation (OSDI)","author":"Haeberlen A.","year":"2010","unstructured":"A. Haeberlen , P. Aditya , R. Rodrigues , and P. Druschel . Accountable virtual machines . In Symposium on Operating Systems Design and Implementation (OSDI) , Oct. 2010 . A. Haeberlen, P. Aditya, R. Rodrigues, and P. Druschel. Accountable virtual machines. In Symposium on Operating Systems Design and Implementation (OSDI), Oct. 2010."},{"key":"e_1_3_2_2_44_1","volume-title":"Symposium on Operating Systems Design and Implementation (OSDI)","author":"Hawblitzel C.","year":"2014","unstructured":"C. Hawblitzel , J. Howell , J. R. Lorch , A. Narayan , B. Parno , D. Zhang , and B. Zill . Ironclad apps: End-to-end security via automated full-system verification . In Symposium on Operating Systems Design and Implementation (OSDI) , Oct. 2014 . C. Hawblitzel, J. Howell, J. R. Lorch, A. Narayan, B. Parno, D. Zhang, and B. Zill. Ironclad apps: End-to-end security via automated full-system verification. In Symposium on Operating Systems Design and Implementation (OSDI), Oct. 2014."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/78969.78972"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451146"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882323"},{"key":"e_1_3_2_2_48_1","volume-title":"Symposium on Operating Systems Design and Implementation (OSDI)","author":"Hunt T.","year":"2016","unstructured":"T. Hunt , Z. Zhu , Y. Xu , S. Peter , and E. Witchel . Ryoan: A distributed sandbox for untrusted computation on secret data . In Symposium on Operating Systems Design and Implementation (OSDI) , Nov. 2016 . T. Hunt, Z. Zhu, Y. Xu, S. Peter, and E. Witchel. Ryoan: A distributed sandbox for untrusted computation on secret data. In Symposium on Operating Systems Design and Implementation (OSDI), Nov. 2016."},{"key":"e_1_3_2_2_49_1","unstructured":"Intel. Intel software guard extensions programming reference. https:\/\/software.intel.com\/sites\/default\/files\/managed\/48\/88\/329298-002.pdf.  Intel. Intel software guard extensions programming reference. https:\/\/software.intel.com\/sites\/default\/files\/managed\/48\/88\/329298-002.pdf."},{"key":"e_1_3_2_2_50_1","volume-title":"USENIX HotCloud Workshop","author":"Jana S.","year":"2011","unstructured":"S. Jana and V. Shmatikov . EVE: Verifying correct execution of cloud-hosted web applications . In USENIX HotCloud Workshop , June 2011 . S. Jana and V. Shmatikov. EVE: Verifying correct execution of cloud-hosted web applications. In USENIX HotCloud Workshop, June 2011."},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.58"},{"key":"e_1_3_2_2_52_1","volume-title":"Symposium on Operating Systems Design and Implementation (OSDI)","author":"Kim T.","year":"2012","unstructured":"T. Kim , R. Chandra , and N. Zeldovich . Efficient patch-based auditing for web applications . In Symposium on Operating Systems Design and Implementation (OSDI) , Oct. 2012 . T. Kim, R. Chandra, and N. Zeldovich. Efficient patch-based auditing for web applications. In Symposium on Operating Systems Design and Implementation (OSDI), Oct. 2012."},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1811039.1811057"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01786227"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1987.1676929"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736031"},{"key":"e_1_3_2_2_57_1","first-page":"617","volume-title":"USENIX Security","author":"Maurer M.","year":"2012","unstructured":"M. Maurer and D. Brumley . Tachyon: tandem execution for efficient live patch testing . USENIX Security , pages 617 -- 630 , Aug. 2012 . M. Maurer and D. Brumley. Tachyon: tandem execution for efficient live patch testing. USENIX Security, pages 617--630, Aug. 2012."},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.17"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352592.1352625"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795284959"},{"key":"e_1_3_2_2_61_1","unstructured":"Oracle flashback technology. http\/\/:www.oracle.com\/technetwork\/database\/features\/availability\/flashback-overview-082751.html.  Oracle flashback technology. http\/\/:www.oracle.com\/technetwork\/database\/features\/availability\/flashback-overview-082751.html."},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/322154.322158"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/1568613.1568623"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629593"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.47"},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.5555\/2060078"},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.21"},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043566"},{"key":"e_1_3_2_2_69_1","volume-title":"Symposium on Networked Systems Design and Implementation (NSDI)","author":"Reis C.","year":"2008","unstructured":"C. Reis , S. D. Gribble , T. Kohno , and N. C. Weaver . Detecting in-flight page changes with Web Tripwires . In Symposium on Networked Systems Design and Implementation (NSDI) , Apr. 2008 . C. Reis, S. D. Gribble, T. Kohno, and N. C. Weaver. Detecting in-flight page changes with Web Tripwires. In Symposium on Networked Systems Design and Implementation (NSDI), Apr. 2008."},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/312203.312214"},{"key":"e_1_3_2_2_71_1","volume-title":"USENIX Security","author":"Sailer R.","year":"2004","unstructured":"R. Sailer , X. Zhang , T. Jaeger , and L. van Doorn . Design and implementation of a TCG-based integrity measurement architecture . In USENIX Security , Aug. 2004 . R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn. Design and implementation of a TCG-based integrity measurement architecture. In USENIX Security, Aug. 2004."},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/2465351.2465357"},{"key":"e_1_3_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.10"},{"key":"e_1_3_2_2_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095812"},{"key":"e_1_3_2_2_75_1","volume-title":"Network and Distributed System Security Symposium (NDSS)","author":"Setty S.","year":"2012","unstructured":"S. Setty , R. McPherson , A. J. Blumberg , and M. Walfish . Making argument systems for outsourced computation practical (sometimes) . In Network and Distributed System Security Symposium (NDSS) , Feb. 2012 . S. Setty, R. McPherson, A. J. Blumberg, and M. Walfish. Making argument systems for outsourced computation practical (sometimes). In Network and Distributed System Security Symposium (NDSS), Feb. 2012."},{"key":"e_1_3_2_2_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/42190.42277"},{"key":"e_1_3_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23500"},{"key":"e_1_3_2_2_78_1","volume-title":"A design and verification methodology for secure isolated regions","author":"Sinha R.","year":"2016","unstructured":"R. Sinha , M. Costa , A. Lal , N. P. Lopes , S. Rajamani , S. A. Seshia , and K. Vaswani . A design and verification methodology for secure isolated regions . June 2016 . R. Sinha, M. Costa, A. Lal, N. P. Lopes, S. Rajamani, S. A. Seshia, and K. Vaswani. A design and verification methodology for secure isolated regions. June 2016."},{"key":"e_1_3_2_2_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043580"},{"key":"e_1_3_2_2_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1986.1663327"},{"key":"e_1_3_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132760"},{"key":"e_1_3_2_2_82_1","volume-title":"USENIX Annual Technical Conference","author":"Tang Y.","year":"2015","unstructured":"Y. Tang and J. Yang . Secure deduplication of general computations . In USENIX Annual Technical Conference , July 2015 . Y. Tang and J. Yang. Secure deduplication of general computations. In USENIX Annual Technical Conference, July 2015."},{"key":"e_1_3_2_2_83_1","doi-asserted-by":"publisher","DOI":"10.5555\/2014698.2014905"},{"key":"e_1_3_2_2_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508267"},{"key":"e_1_3_2_2_85_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.02.019"},{"key":"e_1_3_2_2_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/2110356.2110359"},{"key":"e_1_3_2_2_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653685"},{"key":"e_1_3_2_2_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133984"},{"key":"e_1_3_2_2_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/2641562"},{"key":"e_1_3_2_2_90_1","doi-asserted-by":"publisher","DOI":"10.1006\/jpdc.1993.1015"},{"key":"e_1_3_2_2_91_1","volume-title":"The Guardian","author":"Wray R.","year":"2009","unstructured":"R. Wray . BT drops plan to use Phorm targeted ad service after outcry over privacy . The Guardian , July 2009 . https:\/\/www.theguardian.com\/business\/2009\/jul\/06\/btgroup-privacy-and-the-net. R. Wray. BT drops plan to use Phorm targeted ad service after outcry over privacy. The Guardian, July 2009. https:\/\/www.theguardian.com\/business\/2009\/jul\/06\/btgroup-privacy-and-the-net."},{"key":"e_1_3_2_2_92_1","volume-title":"USENIX Annual Technical Conference","author":"Yang Z.","year":"2011","unstructured":"Z. Yang , M. Yang , L. Xu , H. Chen , and B. Zang . ORDER: Object centRic DEterministic Replay for Java . In USENIX Annual Technical Conference , June 2011 . Z. Yang, M. Yang, L. Xu, H. Chen, and B. Zang. ORDER: Object centRic DEterministic Replay for Java. In USENIX Annual Technical Conference, June 2011."},{"key":"e_1_3_2_2_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629604"},{"key":"e_1_3_2_2_94_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2013.6575303"},{"key":"e_1_3_2_2_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043576"},{"key":"e_1_3_2_2_96_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.43"}],"event":{"name":"SOSP '17: ACM SIGOPS 26th Symposium on Operating Systems Principles","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","USENIX Assoc USENIX Assoc"],"location":"Shanghai China","acronym":"SOSP '17"},"container-title":["Proceedings of the 26th Symposium on Operating Systems Principles"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3132747.3132760","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3132747.3132760","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:10:57Z","timestamp":1750212657000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3132747.3132760"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,14]]},"references-count":96,"alternative-id":["10.1145\/3132747.3132760","10.1145\/3132747"],"URL":"https:\/\/doi.org\/10.1145\/3132747.3132760","relation":{},"subject":[],"published":{"date-parts":[[2017,10,14]]},"assertion":[{"value":"2017-10-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}