{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:48Z","timestamp":1750220868075,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["13-30491 and 09-64392"],"award-info":[{"award-number":["13-30491 and 09-64392"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1145\/3314058.3314061","type":"proceedings-article","created":{"date-parts":[[2019,6,21]],"date-time":"2019-06-21T12:45:07Z","timestamp":1561121107000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["BEEER"],"prefix":"10.1145","author":[{"given":"Avesta","family":"Hojjati","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]},{"given":"Yunhui","family":"Long","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]},{"given":"Soteris","family":"Demetriou","sequence":"additional","affiliation":[{"name":"Imperial College London"}]},{"given":"Carl A.","family":"Gunter","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]}],"member":"320","published-online":{"date-parts":[[2019,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Respiration and circulation. Tech. rep","author":"Altman Philip L","year":"1971","unstructured":"Philip L Altman and Dorothy S Dittmer . Respiration and circulation. Tech. rep . Federation of American Societies for Experimental Biology Bethesda MD , 1971 . Philip L Altman and Dorothy S Dittmer. Respiration and circulation. Tech. rep. Federation of American Societies for Experimental Biology Bethesda MD, 1971."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2011.5958253"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/71.282558"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/127695.122777"},{"key":"e_1_3_2_1_5_1","first-page":"567","volume-title":"Proceedings of the","author":"Balzer Robert M","year":"1969","unstructured":"Robert M Balzer . \"EXDAMS : extendable debugging and monitoring system \". In: Proceedings of the May 14-16, 1969 , spring joint computer conference. ACM. 1969, pp. 567 -- 580 . Robert M Balzer. \"EXDAMS: extendable debugging and monitoring system\". In: Proceedings of the May 14-16, 1969, spring joint computer conference. ACM. 1969, pp. 567--580."},{"key":"e_1_3_2_1_6_1","volume-title":"Retrieved from: McKinsey at https:\/\/goo.gl\/hkrbgE","author":"Bauer Harald","year":"2014","unstructured":"Harald Bauer , Mark Patel , and Jan Veira . \" The Internet of Things : Sizing up the opportunity \". In: Retrieved from: McKinsey at https:\/\/goo.gl\/hkrbgE ( 2014 ). Harald Bauer, Mark Patel, and Jan Veira. \"The Internet of Things: Sizing up the opportunity\". In: Retrieved from: McKinsey at https:\/\/goo.gl\/hkrbgE (2014)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","DOI":"10.56021\/9780801886317","volume-title":"Beyond the black box: the forensics of airplane crashes","author":"Bibel George","year":"2008","unstructured":"George Bibel . Beyond the black box: the forensics of airplane crashes . JHU Press , 2008 . George Bibel. Beyond the black box: the forensics of airplane crashes. JHU Press, 2008."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2006.881997"},{"key":"e_1_3_2_1_9_1","first-page":"191","volume-title":"Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems. ACM.","author":"Nathan","year":"2015","unstructured":"Nathan Dautenhahn et al. \"Nested kernel: An operating system architecture for intra-kernel privilege separation \". In: Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems. ACM. 2015 , pp. 191 -- 206 . Nathan Dautenhahn et al. \"Nested kernel: An operating system architecture for intra-kernel privilege separation\". In: Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems. ACM. 2015, pp. 191--206."},{"key":"e_1_3_2_1_10_1","first-page":"525","volume-title":"11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14)","author":"David","year":"2014","unstructured":"David Devecsery et al. \"Eidetic systems \". In: 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14) . 2014 , pp. 525 -- 540 . David Devecsery et al. \"Eidetic systems\". In: 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14). 2014, pp. 525--540."},{"key":"e_1_3_2_1_11_1","first-page":"1","article-title":"DMP: deterministic shared memory multiprocessing","volume":"37","author":"Joseph Devietti","unstructured":"Joseph Devietti et al . \" DMP: deterministic shared memory multiprocessing \". In: ACM SIGARCH Computer Architecture News. Vol. 37 . 1 . ACM. 2009, pp. 85--96. Joseph Devietti et al. \"DMP: deterministic shared memory multiprocessing\". In: ACM SIGARCH Computer Architecture News. Vol. 37. 1. ACM. 2009, pp. 85--96.","journal-title":"ACM SIGARCH Computer Architecture News."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.4258\/hir.2016.22.3.156"},{"key":"e_1_3_2_1_13_1","first-page":"4","volume-title":"Proceedings of the 5th Program Protection and Reverse Engineering Workshop. ACM.","author":"Brendan","year":"2015","unstructured":"Brendan Dolan-Gavitt et al. \"Repeatable Reverse Engineering with PANDA \". In: Proceedings of the 5th Program Protection and Reverse Engineering Workshop. ACM. 2015 , p. 4 . Brendan Dolan-Gavitt et al. \"Repeatable Reverse Engineering with PANDA\". In: Proceedings of the 5th Program Protection and Reverse Engineering Workshop. ACM. 2015, p. 4."},{"key":"e_1_3_2_1_14_1","first-page":"211","volume-title":"ACM SIGOPS Operating Systems Review 36.SI","author":"Dunlap George W","year":"2002","unstructured":"George W Dunlap \" ReVirt: Enabling intrusion analysis through virtual-machine logging and replay \". In: ACM SIGOPS Operating Systems Review 36.SI ( 2002 ), pp. 211 -- 224 . George W Dunlap et al. \"ReVirt: Enabling intrusion analysis through virtual-machine logging and replay\". In: ACM SIGOPS Operating Systems Review 36.SI (2002), pp. 211--224."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2161237"},{"key":"e_1_3_2_1_16_1","first-page":"147","volume-title":"ACM SIGOPS Operating Systems Review 36.SI","author":"Elson Jeremy","year":"2002","unstructured":"Jeremy Elson , Lewis Girod , and Deborah Estrin . \"Fine-grained network time synchronization using reference broadcasts\". In: ACM SIGOPS Operating Systems Review 36.SI ( 2002 ), pp. 147 -- 163 . Jeremy Elson, Lewis Girod, and Deborah Estrin. \"Fine-grained network time synchronization using reference broadcasts\". In: ACM SIGOPS Operating Systems Review 36.SI (2002), pp. 147--163."},{"key":"e_1_3_2_1_17_1","volume-title":"Time synchronization in wireless ad hoc networks of medical devices and sensors. US Patent App. 11\/719,301","author":"Erdmann Bozena","year":"2005","unstructured":"Bozena Erdmann and David Sanchez Sanchez . Time synchronization in wireless ad hoc networks of medical devices and sensors. US Patent App. 11\/719,301 . 2005 . Bozena Erdmann and David Sanchez Sanchez. Time synchronization in wireless ad hoc networks of medical devices and sensors. US Patent App. 11\/719,301. 2005."},{"key":"e_1_3_2_1_18_1","first-page":"285","article-title":"Friday: Global Comprehension for Distributed Replay","volume":"7","author":"Dennis Geels","year":"2007","unstructured":"Dennis Geels et al . \" Friday: Global Comprehension for Distributed Replay .\" In: NSDI. Vol. 7 . 2007 , pp. 285 -- 298 . Dennis Geels et al. \"Friday: Global Comprehension for Distributed Replay.\" In: NSDI. Vol. 7. 2007, pp. 285--298.","journal-title":"NSDI."},{"key":"e_1_3_2_1_19_1","first-page":"214","volume-title":"Computer Design: VLSI in Computers and Processors, 2002. Proceedings. 2002 IEEE International Conference on. IEEE.","author":"Lewis","year":"2002","unstructured":"Lewis Girod et al. \"Locating tiny sensors in time and space: A case study \". In: Computer Design: VLSI in Computers and Processors, 2002. Proceedings. 2002 IEEE International Conference on. IEEE. 2002 , pp. 214 -- 219 . Lewis Girod et al. \"Locating tiny sensors in time and space: A case study\". In: Computer Design: VLSI in Computers and Processors, 2002. Proceedings. 2002 IEEE International Conference on. IEEE. 2002, pp. 214--219."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.31"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2013.43"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1394608.1382144"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2814270.2814320"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1943552.1943562"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1987.5009516"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1088\/0964-1726\/17\/5\/055018"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.20"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/359545.359563"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064978.1065034"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2011.2182045"},{"issue":"23","key":"e_1_3_2_1_31_1","first-page":"215","article-title":"Virtual time and global states of distributed systems","volume":"1","author":"Mattern Friedemann","year":"1989","unstructured":"Friedemann Mattern . \" Virtual time and global states of distributed systems \". In: Parallel and Distributed Algorithms 1 . 23 ( 1989 ), pp. 215 -- 226 . Friedemann Mattern. \"Virtual time and global states of distributed systems\". In: Parallel and Distributed Algorithms 1.23 (1989), pp. 215--226.","journal-title":"Parallel and Distributed Algorithms"},{"key":"e_1_3_2_1_32_1","unstructured":"medlibes.com Types of Insulin. Accessed: 2017-11-02. url: https:\/\/goo.gl\/ET75tw. medlibes.com Types of Insulin. Accessed: 2017-11-02. url: https:\/\/goo.gl\/ET75tw."},{"key":"e_1_3_2_1_33_1","first-page":"13","article-title":"The 2003 Northeast Blackout-Five Years Later","author":"Minkel JR","year":"2008","unstructured":"JR Minkel . \" The 2003 Northeast Blackout-Five Years Later \". In: Scientific American 13 ( 2008 ). JR Minkel. \"The 2003 Northeast Blackout-Five Years Later\". In: Scientific American 13 (2008).","journal-title":"Scientific American"},{"key":"e_1_3_2_1_34_1","first-page":"911","volume-title":"47th Annual Allerton Conference on. IEEE.","author":"Mo Yilin","year":"2009","unstructured":"Yilin Mo and Bruno Sinopoli . \"Secure control against replay attacks\". In: Communication, Control, and Computing, 2009. Allerton 2009 . 47th Annual Allerton Conference on. IEEE. 2009 , pp. 911 -- 918 . Yilin Mo and Bruno Sinopoli. \"Secure control against replay attacks\". In: Communication, Control, and Computing, 2009. Allerton 2009. 47th Annual Allerton Conference on. IEEE. 2009, pp. 911--918."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-012-0278-9"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2008.36"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508284.1508254"},{"key":"e_1_3_2_1_38_1","first-page":"162","volume-title":"Proceedings of the 4th ACM Multimedia Systems Conference. ACM.","author":"Niall","year":"2013","unstructured":"Niall Murray et al. \"Subjective evaluation of olfactory and visual media synchronization \". In: Proceedings of the 4th ACM Multimedia Systems Conference. ACM. 2013 , pp. 162 -- 171 . Niall Murray et al. \"Subjective evaluation of olfactory and visual media synchronization\". In: Proceedings of the 4th ACM Multimedia Systems Conference. ACM. 2013, pp. 162--171."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-010-0627-7"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/1116644.1116674"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPAE.2008.4412940"},{"key":"e_1_3_2_1_43_1","first-page":"356","volume-title":"Advanced Communication Technology (ICACT), 2016 18th International Conference on. IEEE.","author":"Park Jeman","year":"2016","unstructured":"Jeman Park and Taeho Kim . \"A method of logically time synchronization for safety-critical distributed system \". In: Advanced Communication Technology (ICACT), 2016 18th International Conference on. IEEE. 2016 , pp. 356 -- 359 . Jeman Park and Taeho Kim. \"A method of logically time synchronization for safety-critical distributed system\". In: Advanced Communication Technology (ICACT), 2016 18th International Conference on. IEEE. 2016, pp. 356--359."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISWC.2012.15"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508148.2485977"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.54844"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.40"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1085130.1085139"},{"key":"e_1_3_2_1_49_1","volume-title":"PALS: Physically asynchronous logically synchronous systems. Tech. rep","author":"Lui Sha","year":"2009","unstructured":"Lui Sha et al. PALS: Physically asynchronous logically synchronous systems. Tech. rep . 2009 . Lui Sha et al. PALS: Physically asynchronous logically synchronous systems. Tech. rep. 2009."},{"key":"e_1_3_2_1_50_1","volume-title":"Proceedings of the Third Annual Workshop on Modeling, Benchmarking and Simulation (MoBS 2007","author":"Sheldon MXVMJ","year":"2007","unstructured":"MXVMJ Sheldon and Ganesh Venkitachalam Boris Weissman . \"Retrace : Collecting execution trace with virtual machine deterministic replay \". In: Proceedings of the Third Annual Workshop on Modeling, Benchmarking and Simulation (MoBS 2007 ). 2007 . MXVMJ Sheldon and Ganesh Venkitachalam Boris Weissman. \"Retrace: Collecting execution trace with virtual machine deterministic replay\". In: Proceedings of the Third Annual Workshop on Modeling, Benchmarking and Simulation (MoBS 2007). 2007."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2005.01.002"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0002-8703(33)90139-8"},{"key":"e_1_3_2_1_53_1","first-page":"3","volume-title":"2017 IEEE European Symposium on. IEEE.","author":"Timothy","year":"2017","unstructured":"Timothy Trippel et al. \"WALNUT: Waging doubt on the integrity of mems accelerometers with acoustic injection attacks\". In: Security and Privacy (EuroS&P) , 2017 IEEE European Symposium on. IEEE. 2017 , pp. 3 -- 18 . Timothy Trippel et al. \"WALNUT: Waging doubt on the integrity of mems accelerometers with acoustic injection attacks\". In: Security and Privacy (EuroS&P), 2017 IEEE European Symposium on. IEEE. 2017, pp. 3--18."},{"key":"e_1_3_2_1_54_1","unstructured":"Wikipedia.com Infusion Pump. Accessed: 2017-06-20. url: https:\/\/goo.gl\/DgT1GK. Wikipedia.com Infusion Pump. Accessed: 2017-06-20. url: https:\/\/goo.gl\/DgT1GK."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.2147\/MDER.S50048"}],"event":{"name":"HotSoS: Hot Topics in the Science of Security Symposium","sponsor":["National Security Agency National Security Agency"],"location":"Nashville Tennessee USA","acronym":"HotSoS"},"container-title":["Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314058.3314061","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3314058.3314061","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3314058.3314061","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:48Z","timestamp":1750202628000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314058.3314061"}},"subtitle":["distributed record and replay for medical devices in hospital operating rooms"],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":54,"alternative-id":["10.1145\/3314058.3314061","10.1145\/3314058"],"URL":"https:\/\/doi.org\/10.1145\/3314058.3314061","relation":{},"subject":[],"published":{"date-parts":[[2019,4]]},"assertion":[{"value":"2019-04-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}