{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:23:23Z","timestamp":1771698203543,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":119,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,26]],"date-time":"2021-10-26T00:00:00Z","timestamp":1635206400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,10,26]]},"DOI":"10.1145\/3477132.3483564","type":"proceedings-article","created":{"date-parts":[[2021,10,19]],"date-time":"2021-10-19T15:59:18Z","timestamp":1634659158000},"page":"570-587","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Forerunner"],"prefix":"10.1145","author":[{"given":"Yang","family":"Chen","sequence":"first","affiliation":[{"name":"Microsoft Research"}]},{"given":"Zhongxin","family":"Guo","sequence":"additional","affiliation":[{"name":"Microsoft Research"}]},{"given":"Runhuai","family":"Li","sequence":"additional","affiliation":[{"name":"Zhejiang University, Microsoft Research"}]},{"given":"Shuo","family":"Chen","sequence":"additional","affiliation":[{"name":"Microsoft Research"}]},{"given":"Lidong","family":"Zhou","sequence":"additional","affiliation":[{"name":"Microsoft Research"}]},{"given":"Yajin","family":"Zhou","sequence":"additional","affiliation":[{"name":"Zhejiang University"}]},{"given":"Xian","family":"Zhang","sequence":"additional","affiliation":[{"name":"Microsoft Research"}]}],"member":"320","published-online":{"date-parts":[[2021,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/604131.604133"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2005.119"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"},{"key":"e_1_3_2_1_4_1","volume-title":"2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). 1545--1550","author":"Bach L. M.","unstructured":"L. M. Bach , B. Mihaljevic , and M. Zagar . 2018. Comparative analysis of blockchain consensus algorithms . In 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). 1545--1550 . L. M. Bach, B. Mihaljevic, and M. Zagar. 2018. Comparative analysis of blockchain consensus algorithms. In 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). 1545--1550."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363213"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/349299.349303"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3318041.3355458"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2784731.2784740"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1869459.1869517"},{"key":"e_1_3_2_1_10_1","volume-title":"14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20)","author":"Behrens Jonathan","year":"2020","unstructured":"Jonathan Behrens , Anton Cao , Cel Skeggs , Adam Belay , M Frans Kaashoek , and Nickolai Zeldovich . 2020 . Efficiently Mitigating Transient Execution Attacks using the Unmapped Speculation Contract . In 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20) . 1139--1154. Jonathan Behrens, Anton Cao, Cel Skeggs, Adam Belay, M Frans Kaashoek, and Nickolai Zeldovich. 2020. Efficiently Mitigating Transient Execution Attacks using the Unmapped Speculation Contract. In 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20). 1139--1154."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2695533.2695545"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1565824.1565827"},{"key":"e_1_3_2_1_13_1","volume-title":"Combining GHOST and Casper. arXiv preprint arXiv:2003.03052","author":"Buterin Vitalik","year":"2020","unstructured":"Vitalik Buterin , Diego Hernandez , Thor Kamphefner , Khiem Pham , Zhi Qiao , Danny Ryan , Juhyeok Sin , Ying Wang , and Yan X Zhang . 2020. Combining GHOST and Casper. arXiv preprint arXiv:2003.03052 ( 2020 ). Vitalik Buterin, Diego Hernandez, Thor Kamphefner, Khiem Pham, Zhi Qiao, Danny Ryan, Juhyeok Sin, Ying Wang, and Yan X Zhang. 2020. Combining GHOST and Casper. arXiv preprint arXiv:2003.03052 (2020)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbvi.2019.e00151"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368826.3377907"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/800028.808480"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2004.03.011"},{"key":"e_1_3_2_1_18_1","first-page":"10","article-title":"Stable Deterministic Multithreading through Schedule Memoization","volume":"10","author":"Cui Heming","year":"2010","unstructured":"Heming Cui , Jingyue Wu , Chia-Che Tsai , and Junfeng Yang . 2010 . Stable Deterministic Multithreading through Schedule Memoization .. In OSDI , Vol. 10. 10 . Heming Cui, Jingyue Wu, Chia-Che Tsai, and Junfeng Yang. 2010. Stable Deterministic Multithreading through Schedule Memoization.. In OSDI, Vol. 10. 10.","journal-title":"OSDI"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/115372.115320"},{"key":"e_1_3_2_1_20_1","volume-title":"Vinay Joseph Ribeiro, and Abhijeet Anand","author":"Das Sourav","year":"2018","unstructured":"Sourav Das , Vinay Joseph Ribeiro, and Abhijeet Anand . 2018 . YODA : Enabling computationally intensive contracts on blockchains with Byzantine and Selfish nodes. arXiv preprint arXiv:1811.03265 (2018). Sourav Das, Vinay Joseph Ribeiro, and Abhijeet Anand. 2018. YODA: Enabling computationally intensive contracts on blockchains with Byzantine and Selfish nodes. arXiv preprint arXiv:1811.03265 (2018)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/858570.858575"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2013.6688704"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2814270.2814290"},{"key":"e_1_3_2_1_24_1","volume-title":"Adding concurrency to smart contracts. Distributed Computing","author":"Dickerson Thomas","year":"2019","unstructured":"Thomas Dickerson , Paul Gazzillo , Maurice Herlihy , and Eric Koskinen . 2019. Adding concurrency to smart contracts. Distributed Computing ( 2019 ), 1--17. Thomas Dickerson, Paul Gazzillo, Maurice Herlihy, and Eric Koskinen. 2019. Adding concurrency to smart contracts. Distributed Computing (2019), 1--17."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535838.2535866"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359659"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243856"},{"key":"e_1_3_2_1_28_1","volume-title":"Bitcoin-NG: A Scalable Blockchain Protocol. In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16)","author":"Eyal Ittay","year":"2016","unstructured":"Ittay Eyal , Adem Efe Gencer , Emin Gun Sirer , and Robbert Van Renesse . 2016 . Bitcoin-NG: A Scalable Blockchain Protocol. In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16) . Ittay Eyal, Adem Efe Gencer, Emin Gun Sirer, and Robbert Van Renesse. 2016. Bitcoin-NG: A Scalable Blockchain Protocol. In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-6423(96)00014-7"},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the 2013 conference on Internet measurement conference. ACM, 127--140","author":"Futamura Yoshihiko","year":"2013","unstructured":"Yoshihiko Futamura . 2013 . Generalized partial computation . In Proceedings of the 2013 conference on Internet measurement conference. ACM, 127--140 . Yoshihiko Futamura. 2013. Generalized partial computation. In Proceedings of the 2013 conference on Internet measurement conference. ACM, 127--140."},{"key":"e_1_3_2_1_31_1","volume-title":"Challenges and Pitfalls of Partitioning Blockchains. In 2018 48th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W). 128--133","author":"Fynn Enrique","year":"2018","unstructured":"Enrique Fynn and Fernando Pedone . 2018 . Challenges and Pitfalls of Partitioning Blockchains. In 2018 48th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W). 128--133 . Enrique Fynn and Fernando Pedone. 2018. Challenges and Pitfalls of Partitioning Blockchains. In 2018 48th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W). 128--133."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1543135.1542528"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134760.1134780"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132757"},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of the 38th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages. 563--574","author":"Jens Palsberg Guo","year":"2011","unstructured":"Shu-yu Guo and Jens Palsberg . 2011 . The essence of compiling with traces . In Proceedings of the 38th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages. 563--574 . Shu-yu Guo and Jens Palsberg. 2011. The essence of compiling with traces. In Proceedings of the 38th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages. 563--574."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0013824"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3352020.3352025"},{"key":"e_1_3_2_1_38_1","volume-title":"Proceedings of the 27th USENIX Conference on Security Symposium. USENIX Association, 1353--1370","author":"Kalodner Harry","year":"2018","unstructured":"Harry Kalodner , Steven Goldfeder , Xiaoqi Chen , S Matthew Weinberg , and Edward W Felten . 2018 . Arbitrum: Scalable, private smart contracts . In Proceedings of the 27th USENIX Conference on Security Symposium. USENIX Association, 1353--1370 . Harry Kalodner, Steven Goldfeder, Xiaoqi Chen, S Matthew Weinberg, and Edward W Felten. 2018. Arbitrum: Scalable, private smart contracts. In Proceedings of the 27th USENIX Conference on Security Symposium. USENIX Association, 1353--1370."},{"key":"e_1_3_2_1_39_1","volume-title":"10th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 12). 237--250.","author":"Kapritsos Manos","unstructured":"Manos Kapritsos , Yang Wang , Vivien Quema , Allen Clement , Lorenzo Alvisi , and Mike Dahlin . 2012. All about eve: Execute-verify replication for multi-core servers . In 10th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 12). 237--250. Manos Kapritsos, Yang Wang, Vivien Quema, Allen Clement, Lorenzo Alvisi, and Mike Dahlin. 2012. All about eve: Execute-verify replication for multi-core servers. In 10th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 12). 237--250."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.1999.776544"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63688-7_12"},{"key":"e_1_3_2_1_42_1","volume-title":"A Predictable Incentive Mechanism for TrueBit. arXiv preprint arXiv:1806.11476","author":"Koch Julia","year":"2018","unstructured":"Julia Koch and Christian Reitwiessner . 2018. A Predictable Incentive Mechanism for TrueBit. arXiv preprint arXiv:1806.11476 ( 2018 ). Julia Koch and Christian Reitwiessner. 2018. A Predictable Incentive Mechanism for TrueBit. arXiv preprint arXiv:1806.11476 (2018)."},{"key":"e_1_3_2_1_43_1","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Kogias Eleftherios Kokoris","year":"2016","unstructured":"Eleftherios Kokoris Kogias , Philipp Jovanovic , Nicolas Gailly , Ismail Khoffi , Linus Gasser , and Bryan Ford . 2016 . Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing . In 25th USENIX Security Symposium (USENIX Security 16) . 279--296. Eleftherios Kokoris Kogias, Philipp Jovanovic, Nicolas Gailly, Ismail Khoffi, Linus Gasser, and Bryan Ford. 2016. Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing. In 25th USENIX Security Symposium (USENIX Security 16). 279--296."},{"key":"e_1_3_2_1_44_1","volume-title":"2018 IEEE Symposium on Security and Privacy. 583--598","author":"Kokoris-Kogias E.","unstructured":"E. Kokoris-Kogias , P. Jovanovic , L. Gasser , N. Gailly , E. Syta , and B. Ford . 2018. OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding . In 2018 IEEE Symposium on Security and Privacy. 583--598 . E. Kokoris-Kogias, P. Jovanovic, L. Gasser, N. Gailly, E. Syta, and B. Ford. 2018. OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding. In 2018 IEEE Symposium on Security and Privacy. 583--598."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294267"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2018.00037"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"Derek Leung. 2018. Vault: Fast bootstrapping for cryptocurrencies. Ph.D. Dissertation. Massachusetts Institute of Technology.  Derek Leung. 2018. Vault: Fast bootstrapping for cryptocurrencies. Ph.D. Dissertation. Massachusetts Institute of Technology.","DOI":"10.14722\/ndss.2019.23313"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"Yoad Lewenberg Yonatan Sompolinsky and Aviv Zohar. 2015. Inclusive Block Chain Protocols. In Financial Cryptography and Data Security.  Yoad Lewenberg Yonatan Sompolinsky and Aviv Zohar. 2015. Inclusive Block Chain Protocols. In Financial Cryptography and Data Security.","DOI":"10.1007\/978-3-662-47854-7_33"},{"key":"e_1_3_2_1_49_1","volume-title":"2020 USENIX Annual Technical Conference (USENIX ATC 20)","author":"Li Chenxing","year":"2020","unstructured":"Chenxing Li , Peilun Li , Dong Zhou , Zhe Yang , Ming Wu , Guang Yang , Wei Xu , Fan Long , and Andrew Chi-Chih Yao . 2020 . A Decentralized Blockchain with High Throughput and Fast Confirmation . In 2020 USENIX Annual Technical Conference (USENIX ATC 20) . Chenxing Li, Peilun Li, Dong Zhou, Zhe Yang, Ming Wu, Guang Yang, Wei Xu, Fan Long, and Andrew Chi-Chih Yao. 2020. A Decentralized Blockchain with High Throughput and Fast Confirmation. In 2020 USENIX Annual Technical Conference (USENIX ATC 20)."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3453933.3454021"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359627"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314611"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359636"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18072.2020.9218512"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978389"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"crossref","unstructured":"Renaud Marlet. 2012. Program Specialization. John Wiley & Sons Ltd.  Renaud Marlet. 2012. Program Specialization. John Wiley & Sons Ltd.","DOI":"10.1002\/9781118576984"},{"key":"e_1_3_2_1_57_1","volume-title":"Central European Functional Programming School","author":"Marlow Simon","unstructured":"Simon Marlow . 2011. Parallel and concurrent programming in Haskell . In Central European Functional Programming School . Springer , 339--401. Simon Marlow. 2011. Parallel and concurrent programming in Haskell. In Central European Functional Programming School. Springer, 339--401."},{"key":"e_1_3_2_1_58_1","volume-title":"Chainweb: A proof-of-work parallel-chain architecture for massive throughput. Chainweb Whitepaper 19","author":"Martino Will","year":"2018","unstructured":"Will Martino , Monica Quaintance , and Stuart Popejoy . 2018 . Chainweb: A proof-of-work parallel-chain architecture for massive throughput. Chainweb Whitepaper 19 (2018). Will Martino, Monica Quaintance, and Stuart Popejoy. 2018. Chainweb: A proof-of-work parallel-chain architecture for massive throughput. Chainweb Whitepaper 19 (2018)."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.5555\/791219.791666"},{"key":"e_1_3_2_1_60_1","unstructured":"David Mazi\u00e8res. 2015. The Stellar Consensus Protocol: A Federated Model for Internet-level Consensus.  David Mazi\u00e8res. 2015. The Stellar Consensus Protocol: A Federated Model for Internet-level Consensus."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3318041.3355461"},{"key":"e_1_3_2_1_62_1","volume-title":"Nature 218, 5136","author":"Michie Donald","year":"1968","unstructured":"Donald Michie . 1968. \"Memo\" functions and machine learning. Nature 218, 5136 ( 1968 ), 19--22. Donald Michie. 1968. \"Memo\" functions and machine learning. Nature 218, 5136 (1968), 19--22."},{"key":"e_1_3_2_1_63_1","first-page":"140","article-title":"Network application performance enhancement using speculative execution","volume":"8","author":"Mickens James W","year":"2012","unstructured":"James W Mickens , Jonathan R Howell , Jacob R Lorch , Jeremy E Elson , and Edmund B Nightingale . 2012 . Network application performance enhancement using speculative execution . US Patent 8 , 140 ,646. James W Mickens, Jonathan R Howell, Jacob R Lorch, Jeremy E Elson, and Edmund B Nightingale. 2012. Network application performance enhancement using speculative execution. US Patent 8,140,646.","journal-title":"US Patent"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978399"},{"key":"e_1_3_2_1_65_1","volume-title":"The design and construction of flexible and efficient interactive programming systems","author":"Mitchell James George","unstructured":"James George Mitchell . 1970. The design and construction of flexible and efficient interactive programming systems . Carnegie Mellon University . James George Mitchell. 1970. The design and construction of flexible and efficient interactive programming systems. Carnegie Mellon University."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/99370.99372"},{"key":"e_1_3_2_1_67_1","unstructured":"Steven Muchnick et al. 1997. Advanced compiler design implementation. Morgan kaufmann.  Steven Muchnick et al. 1997. Advanced compiler design implementation. Morgan kaufmann."},{"key":"e_1_3_2_1_68_1","volume-title":"Proceedings. 18th International Conference on Distributed Computing Systems (Cat. No.98CB36183)","author":"Muller G.","unstructured":"G. Muller , R. Marlet , E.-N. Volanschi , C. Consel , C. Pu , and A. Goel . 1998. Fast, optimized Sun RPC using automatic program specialization . In Proceedings. 18th International Conference on Distributed Computing Systems (Cat. No.98CB36183) . 240--249. G. Muller, R. Marlet, E.-N. Volanschi, C. Consel, C. Pu, and A. Goel. 1998. Fast, optimized Sun RPC using automatic program specialization. In Proceedings. 18th International Conference on Distributed Computing Systems (Cat. No.98CB36183). 240--249."},{"key":"e_1_3_2_1_69_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system.","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto . 2008 . Bitcoin: A peer-to-peer electronic cash system. (2008). Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. (2008)."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736026"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2019.00059"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095809.1095829"},{"key":"e_1_3_2_1_73_1","volume-title":"Hybrid Consensus: Efficient Consensus in the Permissionless Model. In 31st International Symposium on Distributed Computing (DISC","author":"Pass Rafael","year":"2017","unstructured":"Rafael Pass and Elaine Shi . 2017 . Hybrid Consensus: Efficient Consensus in the Permissionless Model. In 31st International Symposium on Distributed Computing (DISC 2017). 39:1--39:16. Rafael Pass and Elaine Shi. 2017. Hybrid Consensus: Efficient Consensus in the Permissionless Model. In 31st International Symposium on Distributed Computing (DISC 2017). 39:1--39:16."},{"key":"e_1_3_2_1_74_1","volume-title":"Plasma: Scalable autonomous smart contracts. White paper","author":"Poon Joseph","year":"2017","unstructured":"Joseph Poon and Vitalik Buterin . 2017 . Plasma: Scalable autonomous smart contracts. White paper (2017), 1--47. Joseph Poon and Vitalik Buterin. 2017. Plasma: Scalable autonomous smart contracts. White paper (2017), 1--47."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378461"},{"key":"e_1_3_2_1_76_1","volume-title":"Partial Evaluation","author":"Reps Thomas","unstructured":"Thomas Reps and Todd Turnidge . 1996. Program specialization via program slicing . In Partial Evaluation . Springer , 409--429. Thomas Reps and Todd Turnidge. 1996. Program specialization via program slicing. In Partial Evaluation. Springer, 409--429."},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/277652.277656"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/291006.291063"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414740.2414743"},{"key":"e_1_3_2_1_80_1","volume-title":"Automatic program specialization for Java. ACM Transactions on Programming Languages and Systems (TOPLAS)","author":"Schultz Ulrik P","year":"2003","unstructured":"Ulrik P Schultz , Julia L Lawall , and Charles Consel . 2003. Automatic program specialization for Java. ACM Transactions on Programming Languages and Systems (TOPLAS) ( 2003 ), 452--499. Ulrik P Schultz, Julia L Lawall, and Charles Consel. 2003. Automatic program specialization for Java. ACM Transactions on Programming Languages and Systems (TOPLAS) (2003), 452--499."},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/1328195.1328197"},{"key":"e_1_3_2_1_82_1","volume-title":"Kathleen Ruan, Parimarjan Negi, Lei Yang, Radhika Mittal, Giulia Fanti, and Mohammad Alizadeh.","author":"Sivaraman Vibhaalakshmi","year":"2020","unstructured":"Vibhaalakshmi Sivaraman , Shaileshh Bojja Venkatakrishnan , Kathleen Ruan, Parimarjan Negi, Lei Yang, Radhika Mittal, Giulia Fanti, and Mohammad Alizadeh. 2020 . High Throughput Cryptocurrency Routing in Payment Channel Networks. In 17th {USENIX} Symposium on Networked Systems Design and Implementation ( {NSDI} 20). 777--796. Vibhaalakshmi Sivaraman, Shaileshh Bojja Venkatakrishnan, Kathleen Ruan, Parimarjan Negi, Lei Yang, Radhika Mittal, Giulia Fanti, and Mohammad Alizadeh. 2020. High Throughput Cryptocurrency Routing in Payment Channel Networks. In 17th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 20). 777--796."},{"key":"e_1_3_2_1_83_1","volume-title":"SPECTRE: Serialization of Proof-of-work Events: Confirming Transactions via Recursive Elections.","author":"Sompolinsky Yonatan","year":"2017","unstructured":"Yonatan Sompolinsky , Yoad Lewenberg , and Aviv Zohar . 2017 . SPECTRE: Serialization of Proof-of-work Events: Confirming Transactions via Recursive Elections. Yonatan Sompolinsky, Yoad Lewenberg, and Aviv Zohar. 2017. SPECTRE: Serialization of Proof-of-work Events: Confirming Transactions via Recursive Elections."},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"crossref","unstructured":"Yonatan Sompolinsky and Shai Wyborski. 2020. PHANTOM and GHOSTDAG: A Scalable Generalization of Nakamoto Consensus.  Yonatan Sompolinsky and Shai Wyborski. 2020. PHANTOM and GHOSTDAG: A Scalable Generalization of Nakamoto Consensus.","DOI":"10.1145\/3479722.3480990"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"crossref","unstructured":"Yonatan Sompolinsky and Aviv Zohar. 2015. Secure High-Rate Transaction Processing in Bitcoin. In Financial Cryptography and Data Security.  Yonatan Sompolinsky and Aviv Zohar. 2015. Secure High-Rate Transaction Processing in Bitcoin. In Financial Cryptography and Data Security.","DOI":"10.1007\/978-3-662-47854-7_32"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/858570.858576"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/3033019.3033024"},{"key":"e_1_3_2_1_88_1","first-page":"18","article-title":"Intercepting functions for memoization: A case study using transcendental functions","volume":"12","author":"Suresh Arjun","year":"2015","unstructured":"Arjun Suresh , Bharath Narasimha Swamy , Erven Rohou , and Andr\u00e9 Seznec . 2015 . Intercepting functions for memoization: A case study using transcendental functions . ACM Transactions on Architecture and Code Optimization (TACO) 12 , 2 (2015), 18 -- 11 . Arjun Suresh, Bharath Narasimha Swamy, Erven Rohou, and Andr\u00e9 Seznec. 2015. Intercepting functions for memoization: A case study using transcendental functions. ACM Transactions on Architecture and Code Optimization (TACO) 12, 2 (2015), 18--1.","journal-title":"ACM Transactions on Architecture and Code Optimization (TACO)"},{"key":"e_1_3_2_1_89_1","volume-title":"Scalable Bias-Resistant Distributed Randomness. In 2017 IEEE Symposium on Security and Privacy (SP). 444--460","author":"Syta Ewa","year":"2017","unstructured":"Ewa Syta , Philipp Jovanovic , Eleftherios Kokoris Kogias , Nicolas Gailly , Linus Gasser , Ismail Khoffi , Michael J. Fischer , and Bryan Ford . 2017 . Scalable Bias-Resistant Distributed Randomness. In 2017 IEEE Symposium on Security and Privacy (SP). 444--460 . Ewa Syta, Philipp Jovanovic, Eleftherios Kokoris Kogias, Nicolas Gailly, Linus Gasser, Ismail Khoffi, Michael J. Fischer, and Bryan Ford. 2017. Scalable Bias-Resistant Distributed Randomness. In 2017 IEEE Symposium on Security and Privacy (SP). 444--460."},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806596.1806604"},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/2038037.1941580"},{"key":"e_1_3_2_1_92_1","volume-title":"The concept of a supercompiler. ACM Transactions on Programming Languages and Systems (TOPLAS)","author":"Turchin Valentin F","year":"1986","unstructured":"Valentin F Turchin . 1986. The concept of a supercompiler. ACM Transactions on Programming Languages and Systems (TOPLAS) ( 1986 ), 292--325. Valentin F Turchin. 1986. The concept of a supercompiler. ACM Transactions on Programming Languages and Systems (TOPLAS) (1986), 292--325."},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2018.043191126"},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-19027-9_23"},{"key":"e_1_3_2_1_95_1","volume-title":"16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19)","author":"Wang Jiaping","year":"2019","unstructured":"Jiaping Wang and Hao Wang . 2019 . Monoxide: Scale out Blockchains with Asynchronous Consensus Zones . In 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19) . Jiaping Wang and Hao Wang. 2019. Monoxide: Scale out Blockchains with Asynchronous Consensus Zones. In 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19)."},{"key":"e_1_3_2_1_96_1","volume-title":"Programming in tabled prolog (very) draft. Unfinished book on XSB programming","author":"Warren David S","year":"1999","unstructured":"David S Warren . 1999. Programming in tabled prolog (very) draft. Unfinished book on XSB programming ( 1999 ). David S Warren. 1999. Programming in tabled prolog (very) draft. Unfinished book on XSB programming (1999)."},{"key":"e_1_3_2_1_97_1","unstructured":"Website. [n.d.]. Azure Dedicated Host. https:\/\/azure.microsoft.com\/en-us\/services\/virtual-machines\/dedicated-host\/.  Website. [n.d.]. Azure Dedicated Host. https:\/\/azure.microsoft.com\/en-us\/services\/virtual-machines\/dedicated-host\/."},{"key":"e_1_3_2_1_98_1","unstructured":"Website. [n.d.]. Chainlink: Blockchain Oracles for Connected Smart Contracts. https:\/\/chain.link\/.  Website. [n.d.]. Chainlink: Blockchain Oracles for Connected Smart Contracts. https:\/\/chain.link\/."},{"key":"e_1_3_2_1_99_1","unstructured":"Website. [n.d.]. Ethereum White Paper. https:\/\/ethereum.org\/en\/whitepaper\/.  Website. [n.d.]. Ethereum White Paper. https:\/\/ethereum.org\/en\/whitepaper\/."},{"key":"e_1_3_2_1_100_1","unstructured":"Website. [n.d.]. Geth version 1.9.9. https:\/\/github.com\/ethereum\/go-ethereum\/releases\/tag\/v1.9.9.  Website. [n.d.]. Geth version 1.9.9. https:\/\/github.com\/ethereum\/go-ethereum\/releases\/tag\/v1.9.9."},{"key":"e_1_3_2_1_101_1","unstructured":"Website. [n.d.]. The Go Programming Language. https:\/\/golang.org\/.  Website. [n.d.]. The Go Programming Language. https:\/\/golang.org\/."},{"key":"e_1_3_2_1_102_1","unstructured":"Website. [n.d.]. Optimistic-Rollups for Ethereum. https:\/\/docs.ethhub.io\/ethereum-roadmap\/layer-2-scaling\/optimistic_rollups\/.  Website. [n.d.]. Optimistic-Rollups for Ethereum. https:\/\/docs.ethhub.io\/ethereum-roadmap\/layer-2-scaling\/optimistic_rollups\/."},{"key":"e_1_3_2_1_103_1","unstructured":"Website. [n.d.]. Price Oracle - A Must Have Infrastructure. https:\/\/www.huobidefilabs.io\/en\/Insight\/1313163603254243330.  Website. [n.d.]. Price Oracle - A Must Have Infrastructure. https:\/\/www.huobidefilabs.io\/en\/Insight\/1313163603254243330."},{"key":"e_1_3_2_1_104_1","unstructured":"Website. [n.d.]. The Solidity Contract-Oriented Programming Language. https:\/\/soliditylang.org\/.  Website. [n.d.]. The Solidity Contract-Oriented Programming Language. https:\/\/soliditylang.org\/."},{"key":"e_1_3_2_1_105_1","unstructured":"Website. [n.d.]. State Channels for Ethereum. https:\/\/docs.ethhub.io\/ethereum-roadmap\/layer-2-scaling\/state-channels\/.  Website. [n.d.]. State Channels for Ethereum. https:\/\/docs.ethhub.io\/ethereum-roadmap\/layer-2-scaling\/state-channels\/."},{"key":"e_1_3_2_1_106_1","unstructured":"Website. [n.d.]. Toward a 12 second block time. https:\/\/blog.ethereum.org\/2014\/07\/11\/toward-a-12-second-block-time\/.  Website. [n.d.]. Toward a 12 second block time. https:\/\/blog.ethereum.org\/2014\/07\/11\/toward-a-12-second-block-time\/."},{"key":"e_1_3_2_1_107_1","volume-title":"The Eth2 upgrades | ethereum.org. https:\/\/ethereum.org\/en\/eth2\/. [Online","year":"2021","unstructured":"Website. 2018. The Eth2 upgrades | ethereum.org. https:\/\/ethereum.org\/en\/eth2\/. [Online ; accessed Apr- 2021 ]. Website. 2018. The Eth2 upgrades | ethereum.org. https:\/\/ethereum.org\/en\/eth2\/. [Online; accessed Apr-2021]."},{"key":"e_1_3_2_1_108_1","unstructured":"Website. 2018. Ethereum flavored WebAssembly (ewasm). https:\/\/github.com\/ewasm.  Website. 2018. Ethereum flavored WebAssembly (ewasm). https:\/\/github.com\/ewasm."},{"key":"e_1_3_2_1_109_1","unstructured":"Website. 2020. Ethereum Homepage. https:\/\/www.ethereum.org\/.  Website. 2020. Ethereum Homepage. https:\/\/www.ethereum.org\/."},{"key":"e_1_3_2_1_110_1","unstructured":"Website. 2020. Etherscan. https:\/\/etherscan.io\/.  Website. 2020. Etherscan. https:\/\/etherscan.io\/."},{"key":"e_1_3_2_1_111_1","volume-title":"Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151","author":"Wood Gavin","year":"2014","unstructured":"Gavin Wood . 2014 . Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151 (2014), 1--32. Gavin Wood. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151 (2014), 1--32."},{"key":"e_1_3_2_1_112_1","volume-title":"Scaling out Speculative Execution of Finite-State Machines with Parallel Merge (PPoPP 20)","author":"Xia Yang","unstructured":"Yang Xia , Peng Jiang , and Gagan Agrawal . 2020. Scaling out Speculative Execution of Finite-State Machines with Parallel Merge (PPoPP 20) . Association for Computing Machinery , New York, NY, USA , 160--172. https:\/\/doi.org\/10.1145\/3332466.3374524 10.1145\/3332466.3374524 Yang Xia, Peng Jiang, and Gagan Agrawal. 2020. Scaling out Speculative Execution of Finite-State Machines with Parallel Merge (PPoPP 20). Association for Computing Machinery, New York, NY, USA, 160--172. https:\/\/doi.org\/10.1145\/3332466.3374524"},{"key":"e_1_3_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274808.3274829"},{"key":"e_1_3_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00008"},{"key":"e_1_3_2_1_115_1","volume-title":"Fletcher","author":"Yu Jiyong","year":"2020","unstructured":"Jiyong Yu , Namrata Mantri , Josep Torrellas , Adam Morrison , and Christopher W . Fletcher . 2020 . Speculative Data-Oblivious Execution: Mobilizing Safe Prediction For Safe and Efficient Speculative Execution. In 2020 ACM\/IEEE 47th Annual International Symposium on Computer Architecture (ISCA) . 707--720. https:\/\/doi.org\/10.1109\/ISCA45697.2020.00064 10.1109\/ISCA45697.2020.00064 Jiyong Yu, Namrata Mantri, Josep Torrellas, Adam Morrison, and Christopher W. Fletcher. 2020. Speculative Data-Oblivious Execution: Mobilizing Safe Prediction For Safe and Efficient Speculative Execution. In 2020 ACM\/IEEE 47th Annual International Symposium on Computer Architecture (ISCA). 707--720. https:\/\/doi.org\/10.1109\/ISCA45697.2020.00064"},{"key":"e_1_3_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2017.33"},{"key":"e_1_3_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278312.3278321"},{"key":"e_1_3_2_1_118_1","doi-asserted-by":"crossref","unstructured":"S. M. Zamani M. Movahedi and Mariana Raykova. 2018. RapidChain: A Fast Blockchain Protocol via Full.  S. M. Zamani M. Movahedi and Mariana Raykova. 2018. RapidChain: A Fast Blockchain Protocol via Full.","DOI":"10.1145\/3243734.3243853"},{"key":"e_1_3_2_1_119_1","volume-title":"SkyChain: A Deep Reinforcement Learning-Empowered Dynamic Blockchain Sharding System. In 49th International Conference on Parallel Processing - ICPP.","author":"Zhang Jianting","year":"2020","unstructured":"Jianting Zhang , Zicong Hong , Xiaoyu Qiu , Yufeng Zhan , Song Guo , and Wuhui Chen . 2020 . SkyChain: A Deep Reinforcement Learning-Empowered Dynamic Blockchain Sharding System. In 49th International Conference on Parallel Processing - ICPP. Jianting Zhang, Zicong Hong, Xiaoyu Qiu, Yufeng Zhan, Song Guo, and Wuhui Chen. 2020. SkyChain: A Deep Reinforcement Learning-Empowered Dynamic Blockchain Sharding System. In 49th International Conference on Parallel Processing - ICPP."}],"event":{"name":"SOSP '21: ACM SIGOPS 28th Symposium on Operating Systems Principles","location":"Virtual Event Germany","acronym":"SOSP '21","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","USENIX Assoc USENIX Assoc"]},"container-title":["Proceedings of the ACM SIGOPS 28th Symposium on Operating Systems Principles"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3477132.3483564","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3477132.3483564","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:49:15Z","timestamp":1750193355000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3477132.3483564"}},"subtitle":["Constraint-based Speculative Transaction Execution for Ethereum"],"short-title":[],"issued":{"date-parts":[[2021,10,26]]},"references-count":119,"alternative-id":["10.1145\/3477132.3483564","10.1145\/3477132"],"URL":"https:\/\/doi.org\/10.1145\/3477132.3483564","relation":{},"subject":[],"published":{"date-parts":[[2021,10,26]]},"assertion":[{"value":"2021-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}