{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T19:52:02Z","timestamp":1768420322013,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,14]],"date-time":"2021-06-14T00:00:00Z","timestamp":1623628800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-sa\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS 2008867"],"award-info":[{"award-number":["CNS 2008867"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["BAA N00014-17-S-B010"],"award-info":[{"award-number":["BAA N00014-17-S-B010"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,14]]},"DOI":"10.1145\/3456727.3463767","type":"proceedings-article","created":{"date-parts":[[2021,6,6]],"date-time":"2021-06-06T12:34:14Z","timestamp":1622982854000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Lossless instruction-to-object memory tracing in the Linux kernel"],"prefix":"10.1145","author":[{"given":"Nick","family":"Roessler","sequence":"first","affiliation":[{"name":"University of Pennsylvania"}]},{"given":"Yi","family":"Chien","sequence":"additional","affiliation":[{"name":"Rice University"}]},{"given":"Lucas","family":"Atayde","sequence":"additional","affiliation":[{"name":"Rice University"}]},{"given":"Peiru","family":"Yang","sequence":"additional","affiliation":[{"name":"Rice University"}]},{"given":"Imani","family":"Palmer","sequence":"additional","affiliation":[{"name":"Null Hat Security"}]},{"given":"Lily","family":"Gray","sequence":"additional","affiliation":[{"name":"Rice University"}]},{"given":"Nathan","family":"Dautenhahn","sequence":"additional","affiliation":[{"name":"Rice University"}]}],"member":"320","published-online":{"date-parts":[[2021,6,14]]},"reference":[{"key":"e_1_3_2_1_2_1","unstructured":"Chapter 6: Physical Page Allocation. https:\/\/www.kernel.org\/doc\/gorman\/html\/understand\/understand009.html. Chapter 6: Physical Page Allocation. https:\/\/www.kernel.org\/doc\/gorman\/html\/understand\/understand009.html."},{"key":"e_1_3_2_1_3_1","unstructured":"Chapter 8: Slab Allocation. https:\/\/www.kernel.org\/doc\/gorman\/html\/understand\/understand011.html. Chapter 8: Slab Allocation. https:\/\/www.kernel.org\/doc\/gorman\/html\/understand\/understand011.html."},{"key":"e_1_3_2_1_4_1","unstructured":"Austin Clements. Mtrace. 2014. URL: https:\/\/github.com\/aclements\/mtrace.  Austin Clements. Mtrace. 2014. URL: https:\/\/github.com\/aclements\/mtrace."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699681"},{"key":"e_1_3_2_1_6_1","unstructured":"Coccinelle. https:\/\/www.kernel.org\/doc\/html\/latest\/dev-tools\/coccinelle.html. Coccinelle. https:\/\/www.kernel.org\/doc\/html\/latest\/dev-tools\/coccinelle.html."},{"key":"e_1_3_2_1_7_1","volume-title":"Kernel Timer Systems - eLinux.Org","year":"2017","unstructured":"eLinux. Kernel Timer Systems - eLinux.Org . Oct. 2, 2017 . URL : https:\/\/elinux.org\/Kernel_Timer_Systems. eLinux. Kernel Timer Systems - eLinux.Org. Oct. 2, 2017. URL: https:\/\/elinux.org\/Kernel_Timer_Systems."},{"key":"e_1_3_2_1_8_1","unstructured":"Gcov. https:\/\/gcc.gnu.org\/onlinedocs\/gcc\/Gcov.html. Gcov. https:\/\/gcc.gnu.org\/onlinedocs\/gcc\/Gcov.html."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2483760.2483769"},{"key":"e_1_3_2_1_10_1","volume-title":"May 25","year":"2020","unstructured":"Google. Syzkaller - Kernel Fuzzer. Google , May 25 , 2020 . URL : https:\/\/github.com\/google\/syzkaller. Google. Syzkaller - Kernel Fuzzer. Google, May 25, 2020. URL: https:\/\/github.com\/google\/syzkaller."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/3384134"},{"key":"e_1_3_2_1_12_1","volume-title":"Linux Performance","author":"Gregg Brendan","year":"2020","unstructured":"Brendan Gregg . Linux Performance . 2020 . URL : http:\/\/www.brendangregg.com\/linuxperf.html. Brendan Gregg. Linux Performance. 2020. URL: http:\/\/www.brendangregg.com\/linuxperf.html."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2003.1240294"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486812"},{"key":"e_1_3_2_1_15_1","volume-title":"Austin","author":"Iyer Manoj","year":"2002","unstructured":"Manoj Iyer . \" Analysis of Linux test project's kernel code coverage\". In: Austin , TX : IBM Corporation ( 2002 ). Manoj Iyer. \"Analysis of Linux test project's kernel code coverage\". In: Austin, TX: IBM Corporation (2002)."},{"key":"e_1_3_2_1_16_1","volume-title":"https:\/\/www.kernel.org\/doc\/html\/v3.13\/dev-tools\/kasan.html","author":"Kernel","year":"2018","unstructured":"Kernel address sanitizer. https:\/\/www.kernel.org\/doc\/html\/v3.13\/dev-tools\/kasan.html . 2018 . Kernel address sanitizer. https:\/\/www.kernel.org\/doc\/html\/v3.13\/dev-tools\/kasan.html. 2018."},{"key":"e_1_3_2_1_17_1","unstructured":"Kernel Memory Leak Detector --- The Linux Kernel Documentation. https:\/\/www.kernel.org\/doc\/html\/v4.10\/dev-tools\/kmemleak.html. Kernel Memory Leak Detector --- The Linux Kernel Documentation. https:\/\/www.kernel.org\/doc\/html\/v4.10\/dev-tools\/kmemleak.html."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/775265.775268"},{"key":"e_1_3_2_1_19_1","first-page":"260","volume-title":"Proceedings of the 2003 Ottawa Linux Symposium. Citeseer.","author":"Larson Paul","year":"2003","unstructured":"Paul Larson , Nigel Hinds , Rajan Ravindran , and Hubertus Franke . \" Improving the Linux Test Project with kernel code coverage analysis \". In: Proceedings of the 2003 Ottawa Linux Symposium. Citeseer. 2003 , pp. 260 -- 275 . Paul Larson, Nigel Hinds, Rajan Ravindran, and Hubertus Franke. \"Improving the Linux Test Project with kernel code coverage analysis\". In: Proceedings of the 2003 Ottawa Linux Symposium. Citeseer. 2003, pp. 260--275."},{"key":"e_1_3_2_1_20_1","volume-title":"The Seq_fil Interface","author":"Foundation Linux","year":"2020","unstructured":"Linux Foundation . The Seq_fil Interface . 2020 . URL : https:\/\/github.com\/torvalds\/linux. Linux Foundation. The Seq_fil Interface. 2020. URL: https:\/\/github.com\/torvalds\/linux."},{"key":"e_1_3_2_1_21_1","volume-title":"https:\/\/www.elinux.org\/Ftrace","author":"Linux","year":"2018","unstructured":"Linux ftrace. https:\/\/www.elinux.org\/Ftrace . 2018 . Linux ftrace. https:\/\/www.elinux.org\/Ftrace. 2018."},{"key":"e_1_3_2_1_22_1","unstructured":"Linux Kernel Map. https:\/\/makelinux.github.io\/kernel\/map\/. Linux Kernel Map. https:\/\/makelinux.github.io\/kernel\/map\/."},{"key":"e_1_3_2_1_23_1","unstructured":"Linux kernel memory management Part 1: Introduction. https:\/\/0xax.gitbooks.io\/linux-insides\/content\/MM\/linux-mm-1.html. Linux kernel memory management Part 1: Introduction. https:\/\/0xax.gitbooks.io\/linux-insides\/content\/MM\/linux-mm-1.html."},{"key":"e_1_3_2_1_24_1","unstructured":"Linux kernel memory management Part 2: Fix-Mapped Addresses and ioremap. https:\/\/0xax.gitbooks.io\/linux-insides\/content\/MM\/linux-mm-2.html. Linux kernel memory management Part 2: Fix-Mapped Addresses and ioremap. https:\/\/0xax.gitbooks.io\/linux-insides\/content\/MM\/linux-mm-2.html."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"e_1_3_2_1_26_1","volume-title":"Compendium of Workshops and Tutorials Held in conjunction with PACT'02: International Conference on Parallel Architectures and Compilation Techniques \/ Charney, M.; Kaeli, D. (eds.)","author":"Maebe Jonas","year":"2002","unstructured":"Jonas Maebe , Michiel Ronsse , and Koen De Bosschere . \"DIOTA : Dynamic Instrumentation, Optimization and Transformation of Applications\". eng . In: Compendium of Workshops and Tutorials Held in conjunction with PACT'02: International Conference on Parallel Architectures and Compilation Techniques \/ Charney, M.; Kaeli, D. (eds.) , Charlottesville, Va , 2002 . 2002. Jonas Maebe, Michiel Ronsse, and Koen De Bosschere. \"DIOTA: Dynamic Instrumentation, Optimization and Transformation of Applications\". eng. In: Compendium of Workshops and Tutorials Held in conjunction with PACT'02: International Conference on Parallel Architectures and Compilation Techniques \/ Charney, M.; Kaeli, D. (eds.), Charlottesville, Va, 2002. 2002."},{"key":"e_1_3_2_1_27_1","first-page":"279","volume-title":"Jan.","author":"McVoy Larry","year":"1996","unstructured":"Larry McVoy and Carl Staelin . \"lmbench : Portable Tools for Performance Analysis \". In: Jan. 1996 , pp. 279 -- 294 . Larry McVoy and Carl Staelin. \"lmbench: Portable Tools for Performance Analysis\". In: Jan. 1996, pp. 279--294."},{"key":"e_1_3_2_1_28_1","unstructured":"memleak-bpfcc(8) --- bpfcc-tools --- Debian unstable --- Debian Manpages. URL: https:\/\/manpages.debian.org\/unstable\/bpfcc-tools\/memleak-bpfcc.8.en.html. memleak-bpfcc(8) --- bpfcc-tools --- Debian unstable --- Debian Manpages. URL: https:\/\/manpages.debian.org\/unstable\/bpfcc-tools\/memleak-bpfcc.8.en.html."},{"key":"e_1_3_2_1_29_1","volume-title":"LKML: Ingo Molnar: Kernel\/Timer.c Design (Was: Re: Ktimers Subsystem)","author":"Molnar Ingo","year":"2005","unstructured":"Ingo Molnar . LKML: Ingo Molnar: Kernel\/Timer.c Design (Was: Re: Ktimers Subsystem) . 2005 . URL : https:\/\/lkml.org\/lkml\/2005\/10\/19\/46. Ingo Molnar. LKML: Ingo Molnar: Kernel\/Timer.c Design (Was: Re: Ktimers Subsystem). 2005. URL: https:\/\/lkml.org\/lkml\/2005\/10\/19\/46."},{"key":"e_1_3_2_1_30_1","unstructured":"Eduard Gabriel Munteanu. Documentation\/vm\/kemtrace.txt. https:\/\/lwn.net\/Articles\/327579\/.  Eduard Gabriel Munteanu. Documentation\/vm\/kemtrace.txt. https:\/\/lwn.net\/Articles\/327579\/."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250746"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/361598.361623"},{"key":"e_1_3_2_1_33_1","volume-title":"CVE-2020-8835: Linux Kernel Privilege Escalation via Improper eBPF Program Verification","author":"Paul Manfred","year":"2020","unstructured":"Manfred Paul . CVE-2020-8835: Linux Kernel Privilege Escalation via Improper eBPF Program Verification . 2020 . URL : https:\/\/www.thezdi.com\/blog\/2020\/4\/8\/cve-2020-8835-linux-kernel-privilege-escalation-via-improper-ebpf-program-verification. Manfred Paul. CVE-2020-8835: Linux Kernel Privilege Escalation via Improper eBPF Program Verification. 2020. URL: https:\/\/www.thezdi.com\/blog\/2020\/4\/8\/cve-2020-8835-linux-kernel-privilege-escalation-via-improper-ebpf-program-verification."},{"key":"e_1_3_2_1_34_1","volume-title":"https:\/\/www.phoronix-test-suite.com","author":"Suite Phoronix Test","year":"2018","unstructured":"Phoronix Test Suite . https:\/\/www.phoronix-test-suite.com . 2018 . Phoronix Test Suite. https:\/\/www.phoronix-test-suite.com. 2018."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00041"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1049\/ip-sen:20020198"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITC30.2018.00039"},{"key":"e_1_3_2_1_38_1","volume-title":"Google calls out Samsung for 'unnecessary' changes to Android's kernel","author":"Schoon Ben","year":"2020","unstructured":"Ben Schoon . Google calls out Samsung for 'unnecessary' changes to Android's kernel . 2020 . URL : https:\/\/9to5google.com\/2020\/02\/14\/google-samsung-android-kernel-changes-security\/. Ben Schoon. Google calls out Samsung for 'unnecessary' changes to Android's kernel. 2020. URL: https:\/\/9to5google.com\/2020\/02\/14\/google-samsung-android-kernel-changes-security\/."},{"key":"e_1_3_2_1_39_1","first-page":"2","volume-title":"Proceedings of the Annual Conference on USENIX Annual Technical Conference. ATEC '05","author":"Seward Julian","year":"2005","unstructured":"Julian Seward and Nicholas Nethercote . \" Using Valgrind to Detect Undefined Value Errors with Bit-Precision\". In: Proceedings of the Annual Conference on USENIX Annual Technical Conference. ATEC '05 . Anaheim, CA: USENIX Association , 2005 , p. 2 . Julian Seward and Nicholas Nethercote. \"Using Valgrind to Detect Undefined Value Errors with Bit-Precision\". In: Proceedings of the Annual Conference on USENIX Annual Technical Conference. ATEC '05. Anaheim, CA: USENIX Association, 2005, p. 2."},{"key":"e_1_3_2_1_40_1","unstructured":"Sparse. https:\/\/www.kernel.org\/doc\/html\/latest\/dev-tools\/sparse.html. Sparse. https:\/\/www.kernel.org\/doc\/html\/latest\/dev-tools\/sparse.html."},{"key":"e_1_3_2_1_41_1","unstructured":"strace(1) - Linux manual page. URL: http:\/\/man7.org\/linux\/man-pages\/man1\/strace.1.html. strace(1) - Linux manual page. URL: http:\/\/man7.org\/linux\/man-pages\/man1\/strace.1.html."},{"key":"e_1_3_2_1_42_1","unstructured":"The Undefined Behavior Sanitizer - UBSAN. https:\/\/www.kernel.org\/doc\/html\/v4.11\/dev-tools\/ubsan.html. The Undefined Behavior Sanitizer - UBSAN. https:\/\/www.kernel.org\/doc\/html\/v4.11\/dev-tools\/ubsan.html."},{"key":"e_1_3_2_1_43_1","volume-title":"May","author":"Whalen Michael","year":"2013","unstructured":"Michael Whalen , Gregory Gay , Dongjiang You , Mats Heimdahl , and Matt Staats . \" Observable Modified Condition\/ Decision Coverage\". In: May 2013 . Michael Whalen, Gregory Gay, Dongjiang You, Mats Heimdahl, and Matt Staats. \"Observable Modified Condition\/Decision Coverage\". In: May 2013."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/320385.320400"}],"event":{"name":"SYSTOR '21: The 14th ACM International Systems and Storage Conference","location":"Haifa Israel","acronym":"SYSTOR '21","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","Technion Israel Institute of Technology","USENIX Assoc USENIX Assoc"]},"container-title":["Proceedings of the 14th ACM International Conference on Systems and Storage"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3456727.3463767","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3456727.3463767","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3456727.3463767","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3456727.3463767","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:46:56Z","timestamp":1750193216000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3456727.3463767"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,14]]},"references-count":43,"alternative-id":["10.1145\/3456727.3463767","10.1145\/3456727"],"URL":"https:\/\/doi.org\/10.1145\/3456727.3463767","relation":{},"subject":[],"published":{"date-parts":[[2021,6,14]]},"assertion":[{"value":"2021-06-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}