{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:01Z","timestamp":1750220581886,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,4,27]],"date-time":"2020-04-27T00:00:00Z","timestamp":1587945600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,4,27]]},"DOI":"10.1145\/3380786.3391396","type":"proceedings-article","created":{"date-parts":[[2020,5,4]],"date-time":"2020-05-04T11:20:17Z","timestamp":1588591217000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["PANDAcap"],"prefix":"10.1145","author":[{"given":"Manolis","family":"Stamatogiannakis","sequence":"first","affiliation":[{"name":"Vrije Universiteit Amsterdam"}]},{"given":"Herbert","family":"Bos","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam"}]},{"given":"Paul","family":"Groth","sequence":"additional","affiliation":[{"name":"Universiteit van Amsterdam"}]}],"member":"320","published-online":{"date-parts":[[2020,4,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2011.08.004"},{"volume-title":"a Fast and Portable Dynamic Translator. In &lt;i&gt;Proceedings of USENIX ATC'05&lt;\/i&gt;","author":"Bellard Fabrice","key":"e_1_3_2_1_2_1","unstructured":"Fabrice Bellard . 2005. QEMU , a Fast and Portable Dynamic Translator. In &lt;i&gt;Proceedings of USENIX ATC'05&lt;\/i&gt; . Anaheim, CA, USA . Fabrice Bellard. 2005. QEMU, a Fast and Portable Dynamic Translator. In &lt;i&gt;Proceedings of USENIX ATC'05&lt;\/i&gt;. Anaheim, CA, USA."},{"key":"e_1_3_2_1_3_1","volume-title":"An introduction to Docker for reproducible research. &lt;i&gt;ACM SIGOPS Operating Systems Review&lt;\/i&gt","author":"Boettiger Carl","year":"2015","unstructured":"Carl Boettiger . 2015. An introduction to Docker for reproducible research. &lt;i&gt;ACM SIGOPS Operating Systems Review&lt;\/i&gt ; 49, 1 ( 2015 ), 71&ndash;79. Carl Boettiger. 2015. An introduction to Docker for reproducible research. &lt;i&gt;ACM SIGOPS Operating Systems Review&lt;\/i&gt; 49, 1 (2015), 71&ndash;79."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.12.029"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2899401"},{"key":"e_1_3_2_1_6_1","volume-title":"Chen","author":"Chow Jim","year":"2008","unstructured":"Jim Chow , Tal Garfinkel , and Peter M . Chen . 2008 . Decoupling Dynamic Program Analysis from Execution in Virtual Environments. In &lt;i&gt;Proceedings of USENIX ATC'08&lt;\/i&gt;. Boston, MA, USA. Jim Chow, Tal Garfinkel, and Peter M. Chen. 2008. Decoupling Dynamic Program Analysis from Execution in Virtual Environments. In &lt;i&gt;Proceedings of USENIX ATC'08&lt;\/i&gt;. Boston, MA, USA."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"E. Cozzi M. Graziano Y. Fratantonio and D. Balzarotti. 2018. Understanding Linux Malware. In &lt;i&gt;2018 IEEE Symposium on Security and Privacy (SP)&lt;\/i&gt;. 161&ndash;175.  E. Cozzi M. Graziano Y. Fratantonio and D. Balzarotti. 2018. Understanding Linux Malware. In &lt;i&gt;2018 IEEE Symposium on Security and Privacy (SP)&lt;\/i&gt;. 161&ndash;175.","DOI":"10.1109\/SP.2018.00054"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3322790.3330593"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.7916\/D8WM1C1P"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2843859.2843867"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060309"},{"volume-title":"R2: An Application-Level Kernel for Record and Replay. In &lt;i&gt;Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation&lt;\/i&gt","author":"Guo Zhenyu","key":"e_1_3_2_1_12_1","unstructured":"Zhenyu Guo , Xi Wang , Jian Tang , Xuezheng Liu , Zhilei Xu , Ming Wu , M. Frans Kaashoek , and Zheng Zhang . 2008. R2: An Application-Level Kernel for Record and Replay. In &lt;i&gt;Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation&lt;\/i&gt ; (San Diego, California ) &lt;i&gt;(OSDI&rsquo;08)&lt;\/i&gt;. USENIX Association , USA, 193&ndash;208. Zhenyu Guo, Xi Wang, Jian Tang, Xuezheng Liu, Zhilei Xu, Ming Wu, M. Frans Kaashoek, and Zheng Zhang. 2008. R2: An Application-Level Kernel for Record and Replay. In &lt;i&gt;Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation&lt;\/i&gt; (San Diego, California) &lt;i&gt;(OSDI&rsquo;08)&lt;\/i&gt;. USENIX Association, USA, 193&ndash;208."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2677046.2677050"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.25080\/majora-4af1f417-011"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1093\/gigascience\/giz095"},{"key":"e_1_3_2_1_16_1","volume-title":"Reproducibility and practical adoption of geobia with open-source software in docker containers. &lt;i&gt;Remote Sensing&lt;\/i&gt","author":"Knoth Christian","year":"2017","unstructured":"Christian Knoth and Daniel N&uuml;st. 2017. Reproducibility and practical adoption of geobia with open-source software in docker containers. &lt;i&gt;Remote Sensing&lt;\/i&gt ; 9, 3 ( 2017 ), 290. Christian Knoth and Daniel N&uuml;st. 2017. Reproducibility and practical adoption of geobia with open-source software in docker containers. &lt;i&gt;Remote Sensing&lt;\/i&gt; 9, 3 (2017), 290."},{"key":"e_1_3_2_1_17_1","volume-title":"Docker: Lightweight Linux Containers for Consistent Development and Deployment. &lt;i&gt;Linux J.&lt;\/i&gt","author":"Merkel Dirk","year":"2014","unstructured":"Dirk Merkel . 2014 . Docker: Lightweight Linux Containers for Consistent Development and Deployment. &lt;i&gt;Linux J.&lt;\/i&gt ; 2014, 239, Article 2 (March 2014), 1 pages. 1075-3583 https:\/\/dl.acm.org\/doi\/10.5555\/2600239.2600241 Dirk Merkel. 2014. Docker: Lightweight Linux Containers for Consistent Development and Deployment. &lt;i&gt;Linux J.&lt;\/i&gt; 2014, 239, Article 2 (March 2014), 1 pages. 1075-3583 https:\/\/dl.acm.org\/doi\/10.5555\/2600239.2600241"},{"key":"e_1_3_2_1_18_1","unstructured":"Mozilla.org. 2014. rr. https:\/\/rr-project.org\/.  Mozilla.org. 2014. rr. https:\/\/rr-project.org\/."},{"key":"e_1_3_2_1_19_1","unstructured":"Marcin Nawrocki Matthias W&auml;hlisch Thomas C. Schmidt Christian Keil and Jochen Sch&ouml;nfelder. 2016. A Survey on Honeypot Software and Data Analysis. [arxiv]cs.CR\/1608.06249  Marcin Nawrocki Matthias W&auml;hlisch Thomas C. Schmidt Christian Keil and Jochen Sch&ouml;nfelder. 2016. A Survey on Honeypot Software and Data Analysis. [arxiv]cs.CR\/1608.06249"},{"key":"e_1_3_2_1_20_1","volume-title":"containerit: Generating Dockerfiles for reproducible research with R. &lt;i&gt;Journal of Open Source Software&lt;\/i&gt","author":"Matthias Hinz Daniel","year":"2019","unstructured":"Daniel N&uuml;st and Matthias Hinz . 2019. containerit: Generating Dockerfiles for reproducible research with R. &lt;i&gt;Journal of Open Source Software&lt;\/i&gt ; 4, 40 ( 2019 ), 1603. Daniel N&uuml;st and Matthias Hinz. 2019. containerit: Generating Dockerfiles for reproducible research with R. &lt;i&gt;Journal of Open Source Software&lt;\/i&gt; 4, 40 (2019), 1603."},{"key":"e_1_3_2_1_21_1","volume-title":"If these data could talk. &lt;i&gt;Scientific data&lt;\/i&gt","author":"Pasquier Thomas","year":"2017","unstructured":"Thomas Pasquier , Matthew K Lau , Ana Trisovic , Emery R Boose , Ben Couturier , Merc&egrave; Crosas, Aaron M Ellison , Valerie Gibson , Chris R Jones , and Margo Seltzer . 2017. If these data could talk. &lt;i&gt;Scientific data&lt;\/i&gt ; 4 ( 2017 ). Thomas Pasquier, Matthew K Lau, Ana Trisovic, Emery R Boose, Ben Couturier, Merc&egrave; Crosas, Aaron M Ellison, Valerie Gibson, Chris R Jones, and Margo Seltzer. 2017. If these data could talk. &lt;i&gt;Scientific data&lt;\/i&gt; 4 (2017)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3311955"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920313"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217935.1217938"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93411-2_1"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062176"},{"key":"e_1_3_2_1_27_1","volume-title":"John PA Ioannidis, and Michela Taufer","author":"Stodden Victoria","year":"2016","unstructured":"Victoria Stodden , Marcia McNutt , David H Bailey , Ewa Deelman , Yolanda Gil , Brooks Hanson , Michael A Heroux , John PA Ioannidis, and Michela Taufer . 2016 . Enhancing reproducibility for computational methods. &lt;i&gt;Science&lt;\/i&gt; 354, 6317 (2016), 1240&ndash;1241. Victoria Stodden, Marcia McNutt, David H Bailey, Ewa Deelman, Yolanda Gil, Brooks Hanson, Michael A Heroux, John PA Ioannidis, and Michela Taufer. 2016. Enhancing reproducibility for computational methods. &lt;i&gt;Science&lt;\/i&gt; 354, 6317 (2016), 1240&ndash;1241."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Erik van der Kouwe Gernot Heiser Dennis Andriesse Herbert Bos and Cristiano Giuffrida. 2019. SoK: Benchmarking Flaws in Systems Security. In &lt;i&gt;EuroS&P&lt;\/i&gt;. https:\/\/download.vusec.net\/papers\/benchmarking-crimes_eurosp19.pdf  Erik van der Kouwe Gernot Heiser Dennis Andriesse Herbert Bos and Cristiano Giuffrida. 2019. SoK: Benchmarking Flaws in Systems Security. In &lt;i&gt;EuroS&P&lt;\/i&gt;. https:\/\/download.vusec.net\/papers\/benchmarking-crimes_eurosp19.pdf","DOI":"10.1109\/EuroSP.2019.00031"}],"event":{"name":"EuroSys '20: Fifteenth EuroSys Conference 2020","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Heraklion Greece","acronym":"EuroSys '20"},"container-title":["Proceedings of the 13th European workshop on Systems Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3380786.3391396","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3380786.3391396","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:33Z","timestamp":1750195893000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3380786.3391396"}},"subtitle":["a framework for streamlining collection of full-system traces"],"short-title":[],"issued":{"date-parts":[[2020,4,27]]},"references-count":28,"alternative-id":["10.1145\/3380786.3391396","10.1145\/3380786"],"URL":"https:\/\/doi.org\/10.1145\/3380786.3391396","relation":{},"subject":[],"published":{"date-parts":[[2020,4,27]]},"assertion":[{"value":"2020-04-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}