{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T22:49:55Z","timestamp":1768344595683,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":97,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,1,27]],"date-time":"2023-01-27T00:00:00Z","timestamp":1674777600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"SNSF","award":["Early Postdoc.Mobility grant P2ELP2_195126"],"award-info":[{"award-number":["Early Postdoc.Mobility grant P2ELP2_195126"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,1,27]]},"DOI":"10.1145\/3575693.3575732","type":"proceedings-article","created":{"date-parts":[[2023,1,30]],"date-time":"2023-01-30T22:56:55Z","timestamp":1675119415000},"page":"862-877","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["uBFT: Microsecond-Scale BFT using Disaggregated Memory"],"prefix":"10.1145","author":[{"given":"Marcos K.","family":"Aguilera","sequence":"first","affiliation":[{"name":"VMware Research, USA"}]},{"given":"Naama","family":"Ben-David","sequence":"additional","affiliation":[{"name":"VMware Research, USA"}]},{"given":"Rachid","family":"Guerraoui","sequence":"additional","affiliation":[{"name":"EPFL, Switzerland"}]},{"given":"Antoine","family":"Murat","sequence":"additional","affiliation":[{"name":"EPFL, Switzerland"}]},{"given":"Athanasios","family":"Xygkis","sequence":"additional","affiliation":[{"name":"EPFL, Switzerland"}]},{"given":"Igor","family":"Zablotchi","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,1,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095809.1095817"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293611.3331601"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/3488766.3488800"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.7330354"},{"key":"#cr-split#-e_1_3_2_1_5_1.1","unstructured":"Marcos K. Aguilera Naama Ben-David Rachid Guerraoui Antoine Murat Athanasios Xygkis and Igor Zablotchi. 2022. uBFT: Microsecond-scale BFT using Disaggregated Memory (Extended Version). https:\/\/doi.org\/10.48550\/ARXIV.2210.17174 10.48550\/ARXIV.2210.17174"},{"key":"#cr-split#-e_1_3_2_1_5_1.2","doi-asserted-by":"crossref","unstructured":"Marcos K. Aguilera Naama Ben-David Rachid Guerraoui Antoine Murat Athanasios Xygkis and Igor Zablotchi. 2022. uBFT: Microsecond-scale BFT using Disaggregated Memory (Extended Version). https:\/\/doi.org\/10.48550\/ARXIV.2210.17174","DOI":"10.1145\/3575693.3575732"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.4230\/LIPIcs.DISC.2021.3"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the 12th Conference on Hot Topics in Operating Systems (HotOS \u201909)","author":"Marcos","unstructured":"Marcos K. Aguilera and Michael Walfish. 2009. No Time for Asynchrony . In Proceedings of the 12th Conference on Hot Topics in Operating Systems (HotOS \u201909) . USENIX Association, Berkeley, CA, USA. 3. https:\/\/www.usenix.org\/conference\/hotos-xii\/no-time-asynchrony Marcos K. Aguilera and Michael Walfish. 2009. No Time for Asynchrony. In Proceedings of the 12th Conference on Hot Topics in Operating Systems (HotOS \u201909). USENIX Association, Berkeley, CA, USA. 3. https:\/\/www.usenix.org\/conference\/hotos-xii\/no-time-asynchrony"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87779-0_2"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the 17th Usenix Conference on Networked Systems Design and Implementation (NSDI \u201920)","author":"Arzani Behnaz","year":"2020","unstructured":"Behnaz Arzani , Selim Ciraci , Stefan Saroiu , Alec Wolman , Jack W. Stokes , Geoff Outhred , and Lechao Diwu . 2020 . PrivateEye: Scalable and Privacy-Preserving Compromise Detection in the Cloud . In Proceedings of the 17th Usenix Conference on Networked Systems Design and Implementation (NSDI \u201920) . USENIX Association, Berkeley, CA, USA. 797\u2013816. isbn:978 1939133137 https:\/\/www.usenix.org\/conference\/nsdi20\/presentation\/arzani Behnaz Arzani, Selim Ciraci, Stefan Saroiu, Alec Wolman, Jack W. Stokes, Geoff Outhred, and Lechao Diwu. 2020. PrivateEye: Scalable and Privacy-Preserving Compromise Detection in the Cloud. In Proceedings of the 17th Usenix Conference on Networked Systems Design and Implementation (NSDI \u201920). USENIX Association, Berkeley, CA, USA. 797\u2013816. isbn:9781939133137 https:\/\/www.usenix.org\/conference\/nsdi20\/presentation\/arzani"},{"key":"e_1_3_2_1_11_1","unstructured":"InfiniBand Trade Association. 2020. InfiniBand Architecture General Specifications Memory Placement Extensions. https:\/\/cw.infinibandta.org\/document\/dl\/8594 \t\t\t\t  InfiniBand Trade Association. 2020. InfiniBand Architecture General Specifications Memory Placement Extensions. https:\/\/cw.infinibandta.org\/document\/dl\/8594"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2013.53"},{"key":"e_1_3_2_1_13_1","volume-title":"Avocado: A Secure In-Memory Distributed Storage System. In 2021 USENIX Annual Technical Conference (USENIX ATC \u201921)","author":"Bailleu Maurice","year":"2021","unstructured":"Maurice Bailleu , Dimitra Giantsidi , Vasilis Gavrielatos , Do Le Quoc , Vijay Nagarajan , and Pramod Bhatotia . 2021 . Avocado: A Secure In-Memory Distributed Storage System. In 2021 USENIX Annual Technical Conference (USENIX ATC \u201921) . USENIX Association, Berkeley, CA, USA. 65\u201379. isbn:978-1-939133-23-6 https:\/\/www.usenix.org\/conference\/atc21\/presentation\/bailleu Maurice Bailleu, Dimitra Giantsidi, Vasilis Gavrielatos, Do Le Quoc, Vijay Nagarajan, and Pramod Bhatotia. 2021. Avocado: A Secure In-Memory Distributed Storage System. In 2021 USENIX Annual Technical Conference (USENIX ATC \u201921). USENIX Association, Berkeley, CA, USA. 65\u201379. isbn:978-1-939133-23-6 https:\/\/www.usenix.org\/conference\/atc21\/presentation\/bailleu"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3015146"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/2043535.2043537"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064213"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3519270.3538427"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465084.3467948"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.43"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/3277355.3277417"},{"key":"#cr-split#-e_1_3_2_1_21_1.1","unstructured":"Ethan Buchman Jae Kwon and Zarko Milosevic. 2018. The latest gossip on BFT consensus. https:\/\/doi.org\/10.48550\/ARXIV.1807.04938 10.48550\/ARXIV.1807.04938"},{"key":"#cr-split#-e_1_3_2_1_21_1.2","unstructured":"Ethan Buchman Jae Kwon and Zarko Milosevic. 2018. The latest gossip on BFT consensus. https:\/\/doi.org\/10.48550\/ARXIV.1807.04938"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15260-3"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.14778\/3236187.3236209"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/296806.296824"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294280"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2332432.2332490"},{"key":"e_1_3_2_1_27_1","unstructured":"Yann Collet. 2022. xxHash: Extremely fast non-cryptographic hash algorithm. https:\/\/github.com\/Cyan4973\/xxHash \t\t\t\t  Yann Collet. 2022. xxHash: Extremely fast non-cryptographic hash algorithm. https:\/\/github.com\/Cyan4973\/xxHash"},{"key":"e_1_3_2_1_28_1","unstructured":"Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained. https:\/\/eprint.iacr.org\/2016\/086 \t\t\t\t  Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained. https:\/\/eprint.iacr.org\/2016\/086"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484821"},{"key":"e_1_3_2_1_30_1","unstructured":"Ian Cutress. 2019. CXL Specification 1.0 Released: New Industry High-Speed Interconnect From Intel. https:\/\/www.anandtech.com\/show\/14068\/cxl-specification-1-released-new-industry-high-speed-interconnect-from-intel \t\t\t\t  Ian Cutress. 2019. CXL Specification 1.0 Released: New Industry High-Speed Interconnect From Intel. https:\/\/www.anandtech.com\/show\/14068\/cxl-specification-1-released-new-industry-high-speed-interconnect-from-intel"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3492321.3519594"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1011767.1011818"},{"key":"#cr-split#-e_1_3_2_1_33_1.1","unstructured":"Harish Dattatraya Dixit Laura Boyle Gautham Vunnam Sneha Pendharkar Matt Beadon and Sriram Sankar. 2022. Detecting silent data corruptions in the wild. https:\/\/doi.org\/10.48550\/ARXIV.2203.08989 10.48550\/ARXIV.2203.08989"},{"key":"#cr-split#-e_1_3_2_1_33_1.2","unstructured":"Harish Dattatraya Dixit Laura Boyle Gautham Vunnam Sneha Pendharkar Matt Beadon and Sriram Sankar. 2022. Detecting silent data corruptions in the wild. https:\/\/doi.org\/10.48550\/ARXIV.2203.08989"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815425"},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of the 13th Usenix Conference on Networked Systems Design and Implementation (NSDI \u201916)","author":"Eyal Ittay","year":"2016","unstructured":"Ittay Eyal , Adem Efe Gencer , Emin G\u00fcn Sirer , and Robbert Van Renesse . 2016 . Bitcoin-NG: A Scalable Blockchain Protocol . In Proceedings of the 13th Usenix Conference on Networked Systems Design and Implementation (NSDI \u201916) . USENIX Association, Berkeley, CA, USA. 45\u201359. isbn:978 1931971294 https:\/\/www.usenix.org\/conference\/nsdi16\/technical-sessions\/presentation\/eyal Ittay Eyal, Adem Efe Gencer, Emin G\u00fcn Sirer, and Robbert Van Renesse. 2016. Bitcoin-NG: A Scalable Blockchain Protocol. In Proceedings of the 13th Usenix Conference on Networked Systems Design and Implementation (NSDI \u201916). USENIX Association, Berkeley, CA, USA. 45\u201359. isbn:9781931971294 https:\/\/www.usenix.org\/conference\/nsdi16\/technical-sessions\/presentation\/eyal"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3456631"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132757"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2019.00063"},{"key":"e_1_3_2_1_39_1","volume-title":"High-Performance Memory Disaggregation with DirectCXL. In 2022 USENIX Annual Technical Conference (USENIX ATC \u201922)","author":"Gouk Donghyun","year":"2022","unstructured":"Donghyun Gouk , Sangwon Lee , Miryeong Kwon , and Myoungsoo Jung . 2022 . Direct Access , High-Performance Memory Disaggregation with DirectCXL. In 2022 USENIX Annual Technical Conference (USENIX ATC \u201922) . USENIX Association, Berkeley, CA, USA. 287\u2013294. isbn:978-1-939133-29-65 https:\/\/www.usenix.org\/conference\/atc22\/presentation\/gouk Donghyun Gouk, Sangwon Lee, Miryeong Kwon, and Myoungsoo Jung. 2022. Direct Access, High-Performance Memory Disaggregation with DirectCXL. In 2022 USENIX Annual Technical Conference (USENIX ATC \u201922). USENIX Association, Berkeley, CA, USA. 287\u2013294. isbn:978-1-939133-29-65 https:\/\/www.usenix.org\/conference\/atc22\/presentation\/gouk"},{"key":"e_1_3_2_1_40_1","unstructured":"Tomasz Gromadzki and Jan Marian Michalski. 2019. Persistent Memory Replication Over Traditional RDMA Part 1: Understanding Remote Persistent Memory. https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/persistent-memory-replication-over-traditional-rdma-part-1-understanding-remote-persistent.html \t\t\t\t  Tomasz Gromadzki and Jan Marian Michalski. 2019. Persistent Memory Replication Over Traditional RDMA Part 1: Understanding Remote Persistent Memory. https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/persistent-memory-replication-over-traditional-rdma-part-1-understanding-remote-persistent.html"},{"key":"e_1_3_2_1_41_1","volume-title":"2022 USENIX Annual Technical Conference (USENIX ATC \u201922)","author":"Guerraoui Rachid","year":"2022","unstructured":"Rachid Guerraoui , Antoine Murat , Javier Picorel , Athanasios Xygkis , Huabing Yan , and Pengfei Zuo . 2022 . uKharon: A Membership Service for Microsecond Applications . In 2022 USENIX Annual Technical Conference (USENIX ATC \u201922) . USENIX Association, Berkeley, CA, USA. 101\u2013120. isbn:978-1-939133-29-24 https:\/\/www.usenix.org\/conference\/atc22\/presentation\/guerraoui Rachid Guerraoui, Antoine Murat, Javier Picorel, Athanasios Xygkis, Huabing Yan, and Pengfei Zuo. 2022. uKharon: A Membership Service for Microsecond Applications. In 2022 USENIX Annual Technical Conference (USENIX ATC \u201922). USENIX Association, Berkeley, CA, USA. 101\u2013120. isbn:978-1-939133-29-24 https:\/\/www.usenix.org\/conference\/atc22\/presentation\/guerraoui"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3242086"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851553.2858667"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3458336.3465297"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3102980.3103005"},{"key":"e_1_3_2_1_46_1","volume-title":"Proceedings of the 2010 USENIX Conference on USENIX Annual Technical Conference (USENIX ATC \u201910)","author":"Hunt Patrick","year":"2010","unstructured":"Patrick Hunt , Mahadev Konar , Flavio P. Junqueira , and Benjamin Reed . 2010 . ZooKeeper: Wait-Free Coordination for Internet-Scale Systems . In Proceedings of the 2010 USENIX Conference on USENIX Annual Technical Conference (USENIX ATC \u201910) . USENIX Association, Berkeley, CA, USA. 11 pages. https:\/\/www.usenix.org\/conference\/usenix-atc-10\/zookeeper-wait-free-coordination-internet-scale-systems Patrick Hunt, Mahadev Konar, Flavio P. Junqueira, and Benjamin Reed. 2010. ZooKeeper: Wait-Free Coordination for Internet-Scale Systems. In Proceedings of the 2010 USENIX Conference on USENIX Annual Technical Conference (USENIX ATC \u201910). USENIX Association, Berkeley, CA, USA. 11 pages. https:\/\/www.usenix.org\/conference\/usenix-atc-10\/zookeeper-wait-free-coordination-internet-scale-systems"},{"key":"e_1_3_2_1_47_1","volume-title":"15th USENIX Symposium on Operating Systems Design and Implementation (OSDI \u201921)","author":"Ibanez Stephen","year":"2021","unstructured":"Stephen Ibanez , Alex Mallery , Serhat Arslan , Theo Jepsen , Muhammad Shahbaz , Changhoon Kim , and Nick McKeown . 2021 . The nanoPU: A Nanosecond Network Stack for Datacenters . In 15th USENIX Symposium on Operating Systems Design and Implementation (OSDI \u201921) . USENIX Association, Virtual Event. 239\u2013256. isbn:978-1-939133-22-9 https:\/\/www.usenix.org\/conference\/osdi21\/presentation\/ibanez Stephen Ibanez, Alex Mallery, Serhat Arslan, Theo Jepsen, Muhammad Shahbaz, Changhoon Kim, and Nick McKeown. 2021. The nanoPU: A Nanosecond Network Stack for Datacenters. In 15th USENIX Symposium on Operating Systems Design and Implementation (OSDI \u201921). USENIX Association, Virtual Event. 239\u2013256. isbn:978-1-939133-22-9 https:\/\/www.usenix.org\/conference\/osdi21\/presentation\/ibanez"},{"key":"e_1_3_2_1_48_1","unstructured":"Danga Interactive. 2022. Memcached. https:\/\/memcached.org\/ \t\t\t\t  Danga Interactive. 2022. Memcached. https:\/\/memcached.org\/"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/9780470544839"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626299"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2168836.2168866"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241117"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1658357.1658358"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3477132.3483561"},{"key":"e_1_3_2_1_56_1","volume-title":"Mosharaf Chowdhury, Asaf Cidon, and Kang G. Shin.","author":"Lee Youngmoon","year":"2019","unstructured":"Youngmoon Lee , Hasan Al Maruf , Mosharaf Chowdhury, Asaf Cidon, and Kang G. Shin. 2019 . Mitigating the Performance-Efficiency Tradeoff in Resilient Memory Disaggregation . https:\/\/doi.org\/10.48550\/ARXIV.1910.09727 10.48550\/ARXIV.1910.09727 Youngmoon Lee, Hasan Al Maruf, Mosharaf Chowdhury, Asaf Cidon, and Kang G. Shin. 2019. Mitigating the Performance-Efficiency Tradeoff in Resilient Memory Disaggregation. https:\/\/doi.org\/10.48550\/ARXIV.1910.09727"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872362.2872374"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043583"},{"key":"e_1_3_2_1_59_1","volume-title":"Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation (NSDI \u201909)","author":"Levin Dave","year":"2009","unstructured":"Dave Levin , John R. Douceur , Jacob R. Lorch , and Thomas Moscibroda . 2009 . TrInc: Small Trusted Hardware for Large Distributed Systems . In Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation (NSDI \u201909) . USENIX Association, Berkeley, CA, USA. 14 pages. https:\/\/www.usenix.org\/conference\/nsdi-09\/trinc-small-trusted-hardware-large-distributed-systems Dave Levin, John R. Douceur, Jacob R. Lorch, and Thomas Moscibroda. 2009. TrInc: Small Trusted Hardware for Large Distributed Systems. In Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation (NSDI \u201909). USENIX Association, Berkeley, CA, USA. 14 pages. https:\/\/www.usenix.org\/conference\/nsdi-09\/trinc-small-trusted-hardware-large-distributed-systems"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2018.2860009"},{"key":"e_1_3_2_1_61_1","volume-title":"Henry De Valence, and  Aumasson","author":"Lovecruft Isis Agora","year":"2022","unstructured":"Isis Agora Lovecruft , Henry De Valence, and Aumasson . 2022 . ed25519-dalek: Fast and efficient Rust implementation of ed25519 key generation, signing, and verification in Rust . https:\/\/github.com\/dalek-cryptography\/ed25519-dalek Isis Agora Lovecruft, Henry De Valence, and Aumasson. 2022. ed25519-dalek: Fast and efficient Rust implementation of ed25519 key generation, signing, and verification in Rust. https:\/\/github.com\/dalek-cryptography\/ed25519-dalek"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3382734.3405731"},{"key":"e_1_3_2_1_63_1","volume-title":"Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation (OSDI \u201908)","author":"Mao Yanhua","year":"2008","unstructured":"Yanhua Mao , Flavio P. Junqueira , and Keith Marzullo . 2008 . Mencius: Building Efficient Replicated State Machines for WANs . In Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation (OSDI \u201908) . USENIX Association, Berkeley, CA, USA. 369\u2013384. https:\/\/www.usenix.org\/conference\/osdi-08\/mencius-building-efficient-replicated-state-machines-wans Yanhua Mao, Flavio P. Junqueira, and Keith Marzullo. 2008. Mencius: Building Efficient Replicated State Machines for WANs. In Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation (OSDI \u201908). USENIX Association, Berkeley, CA, USA. 369\u2013384. https:\/\/www.usenix.org\/conference\/osdi-08\/mencius-building-efficient-replicated-state-machines-wans"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2006.35"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3528535.3531516"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2745844.2745848"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278566"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978399"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.5555\/2535461.2535475"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2517350"},{"key":"e_1_3_2_1_71_1","volume-title":"Bitcoin: A Peer-to-Peer Electronic Cash System. https:\/\/bitcoin.org\/bitcoin.pdf","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto . 2008 . Bitcoin: A Peer-to-Peer Electronic Cash System. https:\/\/bitcoin.org\/bitcoin.pdf Satoshi Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System. https:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/2896377.2901489"},{"key":"e_1_3_2_1_73_1","volume-title":"Liquibook: Open source order matching engine. https:\/\/github.com\/enewhuis\/liquibook","author":"Newhuis Eric","year":"2022","unstructured":"Eric Newhuis . 2022 . Liquibook: Open source order matching engine. https:\/\/github.com\/enewhuis\/liquibook Eric Newhuis. 2022. Liquibook: Open source order matching engine. https:\/\/github.com\/enewhuis\/liquibook"},{"key":"e_1_3_2_1_74_1","unstructured":"Jack O\u2019Connor Jean-Philippe Aumasson Samuel Neves and Zooko Wilcox-O\u2019Hearn. 2022. BLAKE3. https:\/\/github.com\/BLAKE3-team\/BLAKE3 \t\t\t\t  Jack O\u2019Connor Jean-Philippe Aumasson Samuel Neves and Zooko Wilcox-O\u2019Hearn. 2022. BLAKE3. https:\/\/github.com\/BLAKE3-team\/BLAKE3"},{"key":"e_1_3_2_1_75_1","volume-title":"Proceedings of the 4th Conference on USENIX Symposium on Internet Technologies and Systems -","volume":"4","author":"Oppenheimer David","unstructured":"David Oppenheimer , Archana Ganapathi , and David A. Patterson . 2003. Why Do Internet Services Fail, and What Can Be Done about It? In Proceedings of the 4th Conference on USENIX Symposium on Internet Technologies and Systems - Volume 4 (USITS \u201903). USENIX Association, Berkeley, CA, USA. 15 pages. https:\/\/www.usenix.org\/conference\/usits-03\/why-do-internet-services-fail-and-what-can-be-done-about-it David Oppenheimer, Archana Ganapathi, and David A. Patterson. 2003. Why Do Internet Services Fail, and What Can Be Done about It? In Proceedings of the 4th Conference on USENIX Symposium on Internet Technologies and Systems - Volume 4 (USITS \u201903). USENIX Association, Berkeley, CA, USA. 15 pages. https:\/\/www.usenix.org\/conference\/usits-03\/why-do-internet-services-fail-and-what-can-be-done-about-it"},{"key":"e_1_3_2_1_76_1","unstructured":"Red Hat. 2020. RHEL for Real Time Timestamping. https:\/\/access.redhat.com\/documentation\/en-us\/red_hat_enterprise_linux_for_real_time\/7\/html\/reference_guide\/chap-timestamping \t\t\t\t  Red Hat. 2020. RHEL for Real Time Timestamping. https:\/\/access.redhat.com\/documentation\/en-us\/red_hat_enterprise_linux_for_real_time\/7\/html\/reference_guide\/chap-timestamping"},{"key":"e_1_3_2_1_77_1","volume-title":"ReDMArk: Bypassing RDMA Security Mechanisms. In 30th USENIX Security Symposium (USENIX Security \u201921)","author":"Rothenberger Benjamin","year":"2021","unstructured":"Benjamin Rothenberger , Konstantin Taranov , Adrian Perrig , and Torsten Hoefler . 2021 . ReDMArk: Bypassing RDMA Security Mechanisms. In 30th USENIX Security Symposium (USENIX Security \u201921) . USENIX Association, Berkeley, CA, USA. 4277\u20134292. isbn:978-1-939133-24-3 https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/rothenberger Benjamin Rothenberger, Konstantin Taranov, Adrian Perrig, and Torsten Hoefler. 2021. ReDMArk: Bypassing RDMA Security Mechanisms. In 30th USENIX Security Symposium (USENIX Security \u201921). USENIX Association, Berkeley, CA, USA. 4277\u20134292. isbn:978-1-939133-24-3 https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/rothenberger"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-W.2018.00054"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/357401.357402"},{"key":"e_1_3_2_1_80_1","unstructured":"Salvatore Sanfilippo. 2022. Redis. https:\/\/github.com\/redis\/redis \t\t\t\t  Salvatore Sanfilippo. 2022. Redis. https:\/\/github.com\/redis\/redis"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2012.6203974"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2009.25"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.5555\/1972457.1972489"},{"key":"e_1_3_2_1_84_1","volume-title":"Proceedings of the 2020 USENIX Conference on Usenix Annual Technical Conference (USENIX ATC \u201920)","author":"Taranov Konstantin","year":"2020","unstructured":"Konstantin Taranov , Benjamin Rothenberger , Adrian Perrig , and Torsten Hoefler . 2020 . sRDMA: Efficient NIC-Based Authentication and Encryption for Remote Direct Memory Access . In Proceedings of the 2020 USENIX Conference on Usenix Annual Technical Conference (USENIX ATC \u201920) . USENIX Association, Berkeley, CA, USA. Article 47, 14 pages. isbn:978-1-939133-14-4 https:\/\/www.usenix.org\/conference\/atc20\/presentation\/taranov Konstantin Taranov, Benjamin Rothenberger, Adrian Perrig, and Torsten Hoefler. 2020. sRDMA: Efficient NIC-Based Authentication and Encryption for Remote Direct Memory Access. In Proceedings of the 2020 USENIX Conference on Usenix Annual Technical Conference (USENIX ATC \u201920). USENIX Association, Berkeley, CA, USA. Article 47, 14 pages. isbn:978-1-939133-14-4 https:\/\/www.usenix.org\/conference\/atc20\/presentation\/taranov"},{"key":"e_1_3_2_1_85_1","volume-title":"RDMA Aware Networks Programming User Manual. Rev 1.7. https:\/\/docs.nvidia.com\/networking\/spaces\/viewspace.action?key=RDMAAwareProgrammingv17","author":"Technologies Mellanox","unstructured":"Mellanox Technologies . 2015. RDMA Aware Networks Programming User Manual. Rev 1.7. https:\/\/docs.nvidia.com\/networking\/spaces\/viewspace.action?key=RDMAAwareProgrammingv17 Mellanox Technologies. 2015. RDMA Aware Networks Programming User Manual. Rev 1.7. https:\/\/docs.nvidia.com\/networking\/spaces\/viewspace.action?key=RDMAAwareProgrammingv17"},{"key":"e_1_3_2_1_86_1","volume-title":"VMA: Linux user space library for network socket acceleration based on RDMA compatible network adaptors. https:\/\/github.com\/Mellanox\/libvma","author":"Technologies Mellanox","year":"2022","unstructured":"Mellanox Technologies . 2022 . VMA: Linux user space library for network socket acceleration based on RDMA compatible network adaptors. https:\/\/github.com\/Mellanox\/libvma Mellanox Technologies. 2022. VMA: Linux user space library for network socket acceleration based on RDMA compatible network adaptors. https:\/\/github.com\/Mellanox\/libvma"},{"key":"e_1_3_2_1_87_1","volume-title":"Proceedings of the 2020 USENIX Conference on Usenix Annual Technical Conference (USENIX ATC \u201920)","author":"Tsai Shin-Yeh","year":"2020","unstructured":"Shin-Yeh Tsai , Yizhou Shan , and Yiying Zhang . 2020 . Disaggregating Persistent Memory and Controlling Them Remotely: An Exploration of Passive Disaggregated Key-Value Stores . In Proceedings of the 2020 USENIX Conference on Usenix Annual Technical Conference (USENIX ATC \u201920) . USENIX Association, Berkeley, CA, USA. Article 3, 16 pages. isbn:978-1-939133-14-4 https:\/\/www.usenix.org\/conference\/atc20\/presentation\/tsai Shin-Yeh Tsai, Yizhou Shan, and Yiying Zhang. 2020. Disaggregating Persistent Memory and Controlling Them Remotely: An Exploration of Passive Disaggregated Key-Value Stores. In Proceedings of the 2020 USENIX Conference on Usenix Annual Technical Conference (USENIX ATC \u201920). USENIX Association, Berkeley, CA, USA. Article 3, 16 pages. isbn:978-1-939133-14-4 https:\/\/www.usenix.org\/conference\/atc20\/presentation\/tsai"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.221"},{"key":"e_1_3_2_1_89_1","volume-title":"Aref","author":"Wang Ruihong","year":"2022","unstructured":"Ruihong Wang , Jianguo Wang , Stratos Idreos , M. Tamer \u00d6zsu , and Walid G . Aref . 2022 . The Case for Distributed Shared-Memory Databases with RDMA-Enabled Memory Disaggregation . https:\/\/doi.org\/10.48550\/ARXIV.2207.03027 10.48550\/ARXIV.2207.03027 Ruihong Wang, Jianguo Wang, Stratos Idreos, M. Tamer \u00d6zsu, and Walid G. Aref. 2022. The Case for Distributed Shared-Memory Databases with RDMA-Enabled Memory Disaggregation. https:\/\/doi.org\/10.48550\/ARXIV.2207.03027"},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/3317550.3321442"},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945470"},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293611.3331591"},{"key":"e_1_3_2_1_93_1","volume-title":"Carbink: Fault-Tolerant Far Memory. In 16th USENIX Symposium on Operating Systems Design and Implementation (OSDI \u201922)","author":"Zhou Yang","year":"2022","unstructured":"Yang Zhou , Hassan M. G. Wassel , Sihang Liu , Jiaqi Gao , James Mickens , Minlan Yu , Chris Kennelly , Paul Turner , David E. Culler , Henry M. Levy , and Amin Vahdat . 2022 . Carbink: Fault-Tolerant Far Memory. In 16th USENIX Symposium on Operating Systems Design and Implementation (OSDI \u201922) . USENIX Association, Berkeley, CA, USA. 55\u201371. isbn:978-1-939133-28-1 https:\/\/www.usenix.org\/conference\/osdi22\/presentation\/zhou-yang Yang Zhou, Hassan M. G. Wassel, Sihang Liu, Jiaqi Gao, James Mickens, Minlan Yu, Chris Kennelly, Paul Turner, David E. Culler, Henry M. Levy, and Amin Vahdat. 2022. Carbink: Fault-Tolerant Far Memory. In 16th USENIX Symposium on Operating Systems Design and Implementation (OSDI \u201922). USENIX Association, Berkeley, CA, USA. 55\u201371. isbn:978-1-939133-28-1 https:\/\/www.usenix.org\/conference\/osdi22\/presentation\/zhou-yang"},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/2637166.2637235"}],"event":{"name":"ASPLOS '23: 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2","location":"Vancouver BC Canada","acronym":"ASPLOS '23","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture","SIGOPS ACM Special Interest Group on Operating Systems","SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3575693.3575732","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3575693.3575732","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:20Z","timestamp":1750182680000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3575693.3575732"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,27]]},"references-count":97,"alternative-id":["10.1145\/3575693.3575732","10.1145\/3575693"],"URL":"https:\/\/doi.org\/10.1145\/3575693.3575732","relation":{},"subject":[],"published":{"date-parts":[[2023,1,27]]},"assertion":[{"value":"2023-01-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}