{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T07:26:15Z","timestamp":1768029975143,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,21]],"date-time":"2020-12-21T00:00:00Z","timestamp":1608508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100012659","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61732019"],"award-info":[{"award-number":["61732019"]}],"id":[{"id":"10.13039\/501100012659","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key R&D Program of China","award":["2017YFB1001804"],"award-info":[{"award-number":["2017YFB1001804"]}]},{"DOI":"10.13039\/100000143","name":"Division of Computing and Communication Foundations","doi-asserted-by":"publisher","award":["CCF-0953759"],"award-info":[{"award-number":["CCF-0953759"]}],"id":[{"id":"10.13039\/100000143","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004739","name":"Youth Innovation Promotion Association of the Chinese Academy of Sciences","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004739","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-1513120"],"award-info":[{"award-number":["CNS-1513120"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Frontier Science Project of Chinese Academy of Sciences","award":["QYZDJ-SSW-JSC036"],"award-info":[{"award-number":["QYZDJ-SSW-JSC036"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,21]]},"DOI":"10.1145\/3324884.3416548","type":"proceedings-article","created":{"date-parts":[[2021,1,27]],"date-time":"2021-01-27T23:38:56Z","timestamp":1611790736000},"page":"536-547","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["CoFI"],"prefix":"10.1145","author":[{"given":"Haicheng","family":"Chen","sequence":"first","affiliation":[{"name":"The Ohio State University"}]},{"given":"Wensheng","family":"Dou","sequence":"additional","affiliation":[{"name":"University of Chinese Academy of Sciences, China"}]},{"given":"Dong","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Chinese Academy of Sciences, China"}]},{"given":"Feng","family":"Qin","sequence":"additional","affiliation":[{"name":"The Ohio State University"}]}],"member":"320","published-online":{"date-parts":[[2021,1,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation. 151--167","author":"Alagappan Ramnatthan","year":"2016","unstructured":"Ramnatthan Alagappan, Aishwarya Ganesan, Yuvraj Patel, Thanumalayan Sankaranarayana Pillai, Andrea C Arpaci-Dusseau, and Remzi H Arpaci-Dusseau. 2016. Correlated crash vulnerabilities. In Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation. 151--167."},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation. 51--68","author":"Alquraan Ahmed","year":"2018","unstructured":"Ahmed Alquraan, Hatem Takruri, Mohammed Alfatafta, and Samer Al-Kiswany. 2018. An analysis of network-partitioning failures in cloud systems. In Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation. 51--68."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987550.2987555"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2723711"},{"key":"e_1_3_2_1_5_1","unstructured":"Ben Brody. 2014. LA residents call 911 when Facebook goes down. https:\/\/money.cnn.com\/2014\/08\/04\/news\/companies\/facebook-outage-911\/index.html."},{"key":"e_1_3_2_1_6_1","unstructured":"Box. 2020. Box customers. https:\/\/www.box.com\/customers."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00040"},{"key":"e_1_3_2_1_8_1","unstructured":"Shigeru Chiba. 2020. Javassist. https:\/\/www.javassist.org."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3267809.3267844"},{"key":"e_1_3_2_1_10_1","unstructured":"Datapth.io. 2017. Recent AWS outage and how you could have avoided downtime. https:\/\/medium.com\/@datapath_io\/recent-aws-outage-and-how-you-could-have-avoided-downtime-7d9d9443d776."},{"key":"e_1_3_2_1_11_1","unstructured":"Dropbox Business. 2020. Customers - Dropbox business. https:\/\/www.dropbox.com\/business\/customers."},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of USENIX Annual Technical Conference.","author":"Duplyakin Dmitry","year":"2019","unstructured":"Dmitry Duplyakin, Robert Ricci, Aleksander Maricq, Gary Wong, Jonathon Duerig, Eric Eide, Leigh Stoller, Mike Hibler, David Johnson, Kirk Webb, Aditya Akella, Kuangching Wang, Glenn Ricart, Larry Landweber, Chip Elliott, Michael Zink, Emmanuel Cecchet, Snigdhaswin Kar, and Prabodh Mishra. 2019. The design and operation of CloudLab. In Proceedings of USENIX Annual Technical Conference."},{"key":"e_1_3_2_1_13_1","unstructured":"Dynamo. 2016. Documentation. http:\/\/cassandra.apache.org\/doc\/latest\/architecture\/dynamo.html."},{"key":"e_1_3_2_1_14_1","volume-title":"Dynamically discovering likely program invariants. Ph","author":"Ernst Michael D.","unstructured":"Michael D. Ernst. 2000. Dynamically discovering likely program invariants. Ph.D. University of Washington Department of Computer Science and Engineering, Seattle, Washington."},{"key":"e_1_3_2_1_15_1","unstructured":"Facebook. 2020. Facebook. https:\/\/www.facebook.com."},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the 15th USENIX Conference on File and Storage Technologies. 149--166","author":"Ganesan Aishwarya","year":"2017","unstructured":"Aishwarya Ganesan, Ramnatthan Alagappan, Andrea C Arpaci-Dusseau, and Remzi H Arpaci-Dusseau. 2017. Redundancy does not imply fault tolerance: Analysis of distributed storage reactions to single errors and corruptions. In Proceedings of the 15th USENIX Conference on File and Storage Technologies. 149--166."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018477"},{"key":"e_1_3_2_1_18_1","unstructured":"Google. 2020. Spanner - Replication. https:\/\/cloud.google.com\/spanner\/docs\/replication."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934891"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180199"},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the 8th USENIX Symposium on Networked Systems Design and Implementation.","author":"Gunawi Haryadi S","year":"2011","unstructured":"Haryadi S Gunawi, Thanh Do, Pallavi Joshi, Peter Alvaro, Joseph M Hellerstein, Andrea C Arpaci-Dusseau, Remzi H Arpaci-Dusseau, Koushik Sen, and Dhruba Borthakur. 2011. FATE and DESTINI: A framework for cloud recovery testing. In Proceedings of the 8th USENIX Symposium on Networked Systems Design and Implementation."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950327"},{"key":"e_1_3_2_1_23_1","volume-title":"Retrieved","author":"Kingsbury Kyle","year":"2018","unstructured":"Kyle Kingsbury. 2018. Distributed systems safety research. Retrieved Oct 10, 2018 from https:\/\/jepsen.io\/"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation. 399--414","author":"Leesatapornwongsa Tanakorn","year":"2014","unstructured":"Tanakorn Leesatapornwongsa, Mingzhe Hao, Pallavi Joshi, Jeffrey F Lukman, and Haryadi S Gunawi. 2014. SAMC: Semantic-aware model checking for fast discovery of deep bugs in cloud systems.. In Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation. 399--414."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872362.2872374"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213874"},{"key":"e_1_3_2_1_27_1","unstructured":"Linkedin. 2020. Linkedin. https:\/\/www.linkedin.com."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3037697.3037735"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3177161"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359645"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3302424.3303986"},{"key":"e_1_3_2_1_32_1","volume-title":"Namazu: Programmable fuzzy scheduler for testing distributed systems. https:\/\/github.com\/osrg\/namazu.","year":"2018","unstructured":"osrg. 2018. Namazu: Programmable fuzzy scheduler for testing distributed systems. https:\/\/github.com\/osrg\/namazu."},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation. 433--448","author":"Pillai Thanumalayan Sankaranarayana","year":"2014","unstructured":"Thanumalayan Sankaranarayana Pillai, Vijay Chidambaram, Ramnatthan Alagappan, Samer Al-Kiswany, Andrea C Arpaci-Dusseau, and Remzi H Arpaci-Dusseau. 2014. All file systems are not created equal: On the complexity of crafting crash-consistent applications. In Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation. 433--448."},{"key":"e_1_3_2_1_34_1","first-page":"1","article-title":"Driller: Augmenting fuzzing through selective symbolic execution","volume":"16","author":"Stephens Nick","year":"2016","unstructured":"Nick Stephens, John Grosen, Christopher Salls, Andrew Dutcher, Ruoyu Wang, Jacopo Corbetta, Yan Shoshitaishvili, Christopher Kruegel, and Giovanni Vigna. 2016. Driller: Augmenting fuzzing through selective symbolic execution. In NDSS, Vol. 16. 1--16.","journal-title":"NDSS"},{"key":"e_1_3_2_1_35_1","unstructured":"The Apache Software Foundation. 2016. Cassandra. http:\/\/cassandra.apache.org."},{"key":"e_1_3_2_1_36_1","unstructured":"The Apache Software Foundation. 2016. Cassandra - Data manipulation. https:\/\/cassandra.apache.org\/doc\/latest\/cql\/dml.html."},{"key":"e_1_3_2_1_37_1","unstructured":"The Apache Software Foundation. 2016. Cassandra's older supported releases. https:\/\/cassandra.apache.org\/download\/."},{"key":"e_1_3_2_1_38_1","unstructured":"The Apache Software Foundation. 2019. Apache Hadoop YARN. https:\/\/hadoop.apache.org\/docs\/current\/hadoop-yarn\/hadoop-yarn-site\/YARN.html."},{"key":"e_1_3_2_1_39_1","unstructured":"The Apache Software Foundation. 2019. HDFS Architecture. http:\/\/hadoop.apache.org\/docs\/current\/hadoop-project-dist\/hadoop-hdfs\/HdfsDesign.html."},{"key":"e_1_3_2_1_40_1","volume-title":"On failure in managed enterprise networks. HP Labs HPL-2012-101","author":"Turner Daniel","year":"2012","unstructured":"Daniel Turner, Kirill Levchenko, Jeffrey C Mogul, Stefan Savage, Alex C Snoeren, Daniel Turner, Kirill Levchenko, Jeffrey C Mogul, Stefan Savage, and Alex C Snoeren. 2012. On failure in managed enterprise networks. HP Labs HPL-2012-101 (2012)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851220"},{"key":"e_1_3_2_1_42_1","unstructured":"Wikipedia. 2020. Two-phase commit protocol. https:\/\/en.wikipedia.org\/wiki\/Two-phase_commit_protocol."},{"key":"e_1_3_2_1_43_1","volume-title":"Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation.","author":"Yang Junfeng","year":"2009","unstructured":"Junfeng Yang, Tisheng Chen, Ming Wu, Zhilei Xu, Xuezheng Liu, Haoxiang Lin, Mao Yang, Fan Long, Lintao Zhang, and Lidong Zhou. 2009. MODIST: Transparent model checking of unmodified distributed systems. In Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation."},{"key":"e_1_3_2_1_44_1","volume-title":"Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation. 249--265","author":"Yuan Ding","year":"2014","unstructured":"Ding Yuan, Yu Luo, Xin Zhuang, Guilherme Renna Rodrigues, Xu Zhao, Yongle Zhang, Pranay U Jain, and Michael Stumm. 2014. Simple testing can prevent most critical failures: An analysis of production failures in distributed data-intensive systems. In Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation. 249--265."},{"key":"e_1_3_2_1_45_1","unstructured":"Michal Zalewski. 2017. American fuzzy lop. https:\/\/lcamtuf.coredump.cx\/afl\/."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.5555\/2685048.2685083"}],"event":{"name":"ASE '20: 35th IEEE\/ACM International Conference on Automated Software Engineering","location":"Virtual Event Australia","acronym":"ASE '20","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416548","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3324884.3416548","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3324884.3416548","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:37Z","timestamp":1750197697000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416548"}},"subtitle":["consistency-guided fault injection for cloud systems"],"short-title":[],"issued":{"date-parts":[[2020,12,21]]},"references-count":46,"alternative-id":["10.1145\/3324884.3416548","10.1145\/3324884"],"URL":"https:\/\/doi.org\/10.1145\/3324884.3416548","relation":{},"subject":[],"published":{"date-parts":[[2020,12,21]]},"assertion":[{"value":"2021-01-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}