{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:21:50Z","timestamp":1750220510573,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,3,22]],"date-time":"2021-03-22T00:00:00Z","timestamp":1616371200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001691","name":"Japan Society for the Promotion of Science","doi-asserted-by":"publisher","award":["JP19K11897, JP19K11900"],"award-info":[{"award-number":["JP19K11897, JP19K11900"]}],"id":[{"id":"10.13039\/501100001691","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,3,22]]},"DOI":"10.1145\/3412841.3442028","type":"proceedings-article","created":{"date-parts":[[2021,4,23]],"date-time":"2021-04-23T05:09:42Z","timestamp":1619154582000},"page":"1532-1541","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["STRAB"],"prefix":"10.1145","author":[{"given":"Shinji","family":"Hoshino","sequence":"first","affiliation":[{"name":"Tokyo Institute of Technology, Tokyo, Japan"}]},{"given":"Yoshitaka","family":"Arahori","sequence":"additional","affiliation":[{"name":"Tokyo Institute of Technology, Tokyo, Japan"}]},{"given":"Katsuhiko","family":"Gondow","sequence":"additional","affiliation":[{"name":"Tokyo Institute of Technology, Tokyo, Japan"}]}],"member":"320","published-online":{"date-parts":[[2021,4,22]]},"reference":[{"volume-title":"LLVM Language Reference. Retrieved","year":"2020","key":"e_1_3_2_1_1_1","unstructured":"2020. LLVM Language Reference. Retrieved September 4, 2020 from https:\/\/llvm.org\/docs\/LangRef.html#alloca-instruction"},{"volume-title":"An Evaluation of Similarity Coefficients for Software Fault Localization. In 2006 12th Pacific Rim International Symposium on Dependable Computing (PRDC'06)","author":"Abreu Rui","key":"e_1_3_2_1_2_1","unstructured":"Rui Abreu, Peter Zoeteweij, and Arjan J.c. Van Gemund. 2006. An Evaluation of Similarity Coefficients for Software Fault Localization. In 2006 12th Pacific Rim International Symposium on Dependable Computing (PRDC'06)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629594"},{"volume-title":"Proceedings of the 13th International Conference on Computer Aided Verification (CAV '01)","author":"Ball Thomas","key":"e_1_3_2_1_4_1","unstructured":"Thomas Ball and Sriram K. Rajamani. 2001. The SLAM Toolkit. In Proceedings of the 13th International Conference on Computer Aided Verification (CAV '01). Springer-Verlag."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736029"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1815961.1815985"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2790077"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/337180.337234"},{"key":"e_1_3_2_1_9_1","volume-title":"Retrieved","author":"Intel Corporation","year":"2017","unstructured":"Intel Corporation. 2017. Intel 64 and IA-32 architectures software developer's manual. Retrieved September 28, 2020 from https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/articles\/intel-sdm.html"},{"key":"e_1_3_2_1_10_1","volume-title":"REPT: Reverse Debugging of Failures in Deployed Software. In 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18)","author":"Cui Weidong","year":"2018","unstructured":"Weidong Cui, Xinyang Ge, Baris Kasikci, Ben Niu, Upamanyu Sharma, Ruoyu Wang, and Insu Yun. 2018. REPT: Reverse Debugging of Failures in Deployed Software. In 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18). USENIX Association."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508255"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950376"},{"key":"e_1_3_2_1_13_1","volume-title":"Chen","author":"Dunlap George W.","year":"2002","unstructured":"George W. Dunlap, Samuel T. King, Sukru Cinar, Murtaza A. Basrai, and Peter M. Chen. 2002. ReVirt: Enabling Intrusion Analysis through Virtual-Machine Logging and Replay. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation (Copyright Restrictions Prevent ACM from Being Able to Make the PDFs for This Conference Available for Downloading) (OSDI '02). USENIX Association."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:FORM.0000040028.49845.67"},{"volume-title":"Proceedings of the 30th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI '09)","author":"Flanagan Cormac","key":"e_1_3_2_1_15_1","unstructured":"Cormac Flanagan and Stephen N. Freund. 2009. FastTrack: Efficient and Precise Dynamic Race Detection. In Proceedings of the 30th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI '09). Association for Computing Machinery."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1040305.1040315"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/263699.263717"},{"key":"e_1_3_2_1_18_1","volume-title":"Software Model Checking: The VeriSoft Approach. Formal Methods in System Design 26 (09","author":"Godefroid Patrice","year":"2003","unstructured":"Patrice Godefroid. 2003. Software Model Checking: The VeriSoft Approach. Formal Methods in System Design 26 (09 2003)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503279"},{"volume-title":"Proceedings of the 2011 IEEE 17th International Symposium on High Performance Computer Architecture (HPCA '11)","author":"Hower Derek R.","key":"e_1_3_2_1_20_1","unstructured":"Derek R. Hower, Polina Dudnik, Mark D. Hill, and David A. Wood. 2011. Calvin: Deterministic or Not? Free Will to Choose. In Proceedings of the 2011 IEEE 17th International Symposium on High Performance Computer Architecture (HPCA '11). IEEE Computer Society."},{"volume-title":"Proceedings of the 35th Annual International Symposium on Computer Architecture (ISCA '08)","author":"Derek","key":"e_1_3_2_1_21_1","unstructured":"Derek R. Hower and Mark D. Hill. 2008. Rerun: Exploiting Episodes for Lightweight Memory Race Recording. In Proceedings of the 35th Annual International Symposium on Computer Architecture (ISCA '08). IEEE Computer Society."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2983990.2984024"},{"volume-title":"2009 IEEE International Symposium on Parallel Distributed Processing. 1--13","author":"Jannesari Ali","key":"e_1_3_2_1_23_1","unstructured":"Ali Jannesari, Kaibin Bao, Victor Pankratius, and Walter F. Tichy. 2009. Helgrind+: An efficient dynamic race detector. In 2009 IEEE International Symposium on Parallel Distributed Processing. 1--13."},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the 34th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI'13)","author":"Jeff Huang","year":"2013","unstructured":"Huang Jeff, Zhang Charles, and Dolby Julian. 2013. CLAP: Recording Local Executions to Reproduce Concurrency Failures. In Proceedings of the 34th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI'13). Association for Computing Machinery."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1869459.1869481"},{"volume-title":"Proceedings of the 20th IEEE\/ACM International Conference on Automated Software Engineering (ASE '05)","author":"James","key":"e_1_3_2_1_26_1","unstructured":"James A. Jones and Mary Jean Harrold. 2005. Empirical Evaluation of the Tarantula Automatic Fault-Localization Technique. In Proceedings of the 20th IEEE\/ACM International Conference on Automated Software Engineering (ASE '05). Association for Computing Machinery."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132767"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815412"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254119"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736031"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1394608.1382146"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508256"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629593"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Jo\u00e3o Carlos Pereira Nuno Machado and Jorge Sousa Pinto. 2020. Testing for Race Conditions in Distributed Systems via SMT Solving. In Tests and Proofs Wolfgang Ahrendt and Heike Wehrheim (Eds.). Springer International Publishing.","DOI":"10.1007\/978-3-030-50995-8_7"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134019"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/312203.312214"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950370"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2000.873645"},{"volume-title":"Proceedings of the 37th Annual International Symposium on Computer Architecture (ISCA '10)","author":"Voskuilen Gwendolyn","key":"e_1_3_2_1_39_1","unstructured":"Gwendolyn Voskuilen, Faraz Ahmad, and T. N. Vijaykumar. 2010. Timetraveler: Exploiting Acyclic Races for Optimizing Memory Race Recording. In Proceedings of the 37th Annual International Symposium on Computer Architecture (ISCA '10). Association for Computing Machinery."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/871656.859633"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1168857.1168865"}],"event":{"name":"SAC '21: The 36th ACM\/SIGAPP Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Virtual Event Republic of Korea","acronym":"SAC '21"},"container-title":["Proceedings of the 36th Annual ACM Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3412841.3442028","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3412841.3442028","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:25Z","timestamp":1750195465000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3412841.3442028"}},"subtitle":["state recovery using reverse execution at IR level for concurrent programs"],"short-title":[],"issued":{"date-parts":[[2021,3,22]]},"references-count":41,"alternative-id":["10.1145\/3412841.3442028","10.1145\/3412841"],"URL":"https:\/\/doi.org\/10.1145\/3412841.3442028","relation":{},"subject":[],"published":{"date-parts":[[2021,3,22]]},"assertion":[{"value":"2021-04-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}