{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T17:47:16Z","timestamp":1770227236072,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,27]],"date-time":"2023-11-27T00:00:00Z","timestamp":1701043200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001665","name":"Agence Nationale de la Recherche","doi-asserted-by":"publisher","award":["ANR-20-CE25-0005, ANR-20-CE25-0013, 11-LABX-0040"],"award-info":[{"award-number":["ANR-20-CE25-0005, ANR-20-CE25-0013, 11-LABX-0040"]}],"id":[{"id":"10.13039\/501100001665","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,27]]},"DOI":"10.1145\/3590140.3592849","type":"proceedings-article","created":{"date-parts":[[2023,11,24]],"date-time":"2023-11-24T18:06:33Z","timestamp":1700849193000},"page":"15-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Fast VM Replication on Heterogeneous Hypervisors for Robust Fault Tolerance"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-9713-7192","authenticated-orcid":false,"given":"Jean-Baptiste","family":"Decourcelle","sequence":"first","affiliation":[{"name":"IRIT, Universit\u00e9 de Toulouse, CNRS, Toulouse INP, UT3, Toulouse, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8642-8742","authenticated-orcid":false,"given":"Tu Dinh","family":"Ngoc","sequence":"additional","affiliation":[{"name":"IRIT, Universit\u00e9 de Toulouse, CNRS, Toulouse INP, UT3, Toulouse, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6528-8904","authenticated-orcid":false,"given":"Boris","family":"Teabe","sequence":"additional","affiliation":[{"name":"IRIT, Universit\u00e9 de Toulouse, CNRS, Toulouse INP, UT3, Toulouse, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0978-2155","authenticated-orcid":false,"given":"Daniel","family":"Hagimont","sequence":"additional","affiliation":[{"name":"IRIT, Universit\u00e9 de Toulouse, CNRS, Toulouse INP, UT3, Toulouse, France"}]}],"member":"320","published-online":{"date-parts":[[2023,11,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609960"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2012.6237041"},{"key":"e_1_3_2_1_3_1","unstructured":"Harold Booth Doug Rike Gregory A Witte et al. 2013. The national vulnerability database (nvd): Overview. ITL Bulletin National Institute of Standards and Technology Gaithersburg MD (2013)."},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the 5th USENIX symposium on networked systems design and implementation","author":"Cully Brendan","year":"2008","unstructured":"Brendan Cully, Geoffrey Lefebvre, Dutch Meyer, Mike Feeley, Norm Hutchinson, and Andrew Warfield. 2008. Remus: High availability via asynchronous virtual machine replication. In Proceedings of the 5th USENIX symposium on networked systems design and implementation. San Francisco, 161--174."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/3105112.3105116"},{"key":"e_1_3_2_1_6_1","unstructured":"Theo de Raadt. 2015. pledge() - a new mitigation mechanism. https:\/\/www.openbsd.org\/papers\/hackfest2015-pledge\/mgp00001.html."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755933"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313808.3313821"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523616.2523630"},{"key":"e_1_3_2_1_10_1","volume-title":"An Empirical Analysis of Vulnerabilities in Virtualization Technologies. In 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom). 533--538","author":"Gkortzis A.","unstructured":"A. Gkortzis, S. Rizou, and D. Spinellis. 2016. An Empirical Analysis of Vulnerabilities in Virtualization Technologies. In 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom). 533--538."},{"key":"e_1_3_2_1_11_1","unstructured":"Google Inc. [n.d.]. MiraclePtr&lt;T&gt; One Pager. https:\/\/docs.google.com\/document\/d\/1pnnOAIz_DMWDI4oIOFoMAqLnf_MZ2GsrJNb_dbQ3ZBg\/edit?usp=sharing."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2996890.2996894"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66332-6_1"},{"key":"e_1_3_2_1_14_1","unstructured":"Yuseok Jeon WookHyun Han Nathan Burow and Mathias Payer. 2020. FuZZan: Efficient sanitizer metadata design for fuzzing. In 2020 {USENIX} Annual Technical Conference ({USENIX} {ATC} 20). 249--263."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629596"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.20"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.25"},{"key":"e_1_3_2_1_18_1","volume-title":"Verifying the Microsoft Hyper-V Hypervisor with VCC. In FM 2009: Formal Methods, Ana Cavalcanti and Dennis R. Dams (Eds.). Springer Berlin Heidelberg","author":"Leinenbach Dirk","year":"2009","unstructured":"Dirk Leinenbach and Thomas Santen. 2009. Verifying the Microsoft Hyper-V Hypervisor with VCC. In FM 2009: Formal Methods, Ana Cavalcanti and Dennis R. Dams (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 806--809."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213874"},{"key":"e_1_3_2_1_20_1","volume-title":"Jan-Erik Ekberg, and N Asokan.","author":"Liljestrand Hans","year":"2019","unstructured":"Hans Liljestrand, Thomas Nyman, Kui Wang, Carlos Chinea Perez, Jan-Erik Ekberg, and N Asokan. 2019. {PAC} it up: Towards Pointer Integrity using {ARM} Pointer Authentication. In 28th {USENIX} Security Symposium ({USENIX} Security 19). 177--194."},{"key":"e_1_3_2_1_21_1","volume-title":"In International Workshop on Virtualization Technology (IWVT'08)","author":"Liu Pengcheng","year":"2008","unstructured":"Pengcheng Liu, Ziye Yang, Xiang Song, Yixun Zhou, Haibo Chen, and Binyu Zang. 2008. Heterogeneous live migration of virtual machines. In In International Workshop on Virtualization Technology (IWVT'08)."},{"key":"e_1_3_2_1_22_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Mi Zeyu","year":"2020","unstructured":"Zeyu Mi, Dingji Li, Haibo Chen, Binyu Zang, and Haibing Guan. 2020. (Mostly) Exitless VM Protection from Untrusted Hypervisor through Disaggregated Nested Virtualization. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 1695--1712. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/mi"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2019.2915318"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447786.3456235"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2014.6785472"},{"key":"e_1_3_2_1_26_1","volume-title":"Design and provability of a statically configurable hypervisor. Technische Universit\u00e4t Berlin","author":"Nordholz Jan","year":"2017","unstructured":"Jan Nordholz. 2017. Design and provability of a statically configurable hypervisor. Technische Universit\u00e4t Berlin (2017)."},{"key":"e_1_3_2_1_27_1","volume-title":"Parmesan: Sanitizer-guided greybox fuzzing. In 29th { USENIX} Security Symposium ({USENIX} Security 20). 2289--2306.","author":"\u00d6sterlund Sebastian","year":"2020","unstructured":"Sebastian \u00d6sterlund, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida. 2020. Parmesan: Sanitizer-guided greybox fuzzing. In 29th { USENIX} Security Symposium ({USENIX} Security 20). 2289--2306."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484811"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484402.2484406"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134073"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274808.3274812"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447786.3456232"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-012-0253-y"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Sergej Schumilo Cornelius Aschermann Ali Abbasi Simon W\u00f6rner and Thorsten Holz. 2020. HYPER-CUBE: High-Dimensional Hypervisor Fuzzing.. In NDSS.","DOI":"10.14722\/ndss.2020.23096"},{"key":"e_1_3_2_1_35_1","volume-title":"Nyx: Greybox hypervisor fuzzing using fast snapshots and affine types. In 30th {USENIX} Security Symposium ({USENIX} Security 21).","author":"Schumilo Sergej","year":"2021","unstructured":"Sergej Schumilo, Cornelius Aschermann, Ali Abbasi, Simon W\u00f6rner, and Thorsten Holz. 2021. Nyx: Greybox hypervisor fuzzing using fast snapshots and affine types. In 30th {USENIX} Security Symposium ({USENIX} Security 21)."},{"key":"e_1_3_2_1_36_1","volume-title":"Hy-FiX: Fast In-place Upgrades of KVM Hypervisors","author":"Segalini Andrea","year":"2021","unstructured":"Andrea Segalini, Dino Lopez-Pacheco, Guillaume Urvoy-Keller, Fabien Hermenier, and Quentin Jaquemart. 2021. Hy-FiX: Fast In-place Upgrades of KVM Hypervisors. IEEE Transactions on Cloud Computing (2021)."},{"key":"e_1_3_2_1_37_1","volume-title":"Addresssanitizer: A fast address sanity checker. In 2012 {USENIX} Annual Technical Conference ({USENIX}{ATC} 12). 309--318.","author":"Serebryany Konstantin","year":"2012","unstructured":"Konstantin Serebryany, Derek Bruening, Alexander Potapenko, and Dmitriy Vyukov. 2012. Addresssanitizer: A fast address sanity checker. In 2012 {USENIX} Annual Technical Conference ({USENIX}{ATC} 12). 309--318."},{"key":"e_1_3_2_1_38_1","volume-title":"Deconstructing Xen. In 24th Annual Network and Distributed System Security Symposium, NDSS 2017","author":"Shi Le","year":"2017","unstructured":"Le Shi, Yuming Wu, Yubin Xia, Nathan Dautenhahn, Haibo Chen, Binyu Zang, and Jinming Li. 2017. Deconstructing Xen. In 24th Annual Network and Distributed System Security Symposium, NDSS 2017, San Diego, California, USA, February 26 - March 1, 2017. The Internet Society. https:\/\/www.ndss-symposium.org\/ndss2017\/ndss-2017-programme\/deconstructing-xen\/"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00010"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755935"},{"key":"e_1_3_2_1_41_1","unstructured":"syzkaller authors. [n. d.]. syzkaller - kernel fuzzer. https:\/\/github.com\/google\/syzkaller."},{"key":"e_1_3_2_1_42_1","unstructured":"The kernel development community. [n. d.]. The Kernel Address Sanitizer (KASAN). https:\/\/www.kernel.org\/doc\/html\/latest\/dev-tools\/kasan.html."},{"key":"e_1_3_2_1_43_1","unstructured":"The kernel development community. [n. d.]. The Kernel Concurrency Sanitizer (KCSAN). https:\/\/www.kernel.org\/doc\/html\/latest\/dev-tools\/kcsan.html."},{"key":"e_1_3_2_1_44_1","unstructured":"The kernel development community. [n. d.]. Kernel Electric-Fence (KFENCE). https:\/\/www.kernel.org\/doc\/html\/latest\/dev-tools\/kfence.html."},{"key":"e_1_3_2_1_45_1","unstructured":"The kernel development community. [n. d.]. Kernel Memory Leak Detector. https:\/\/www.kernel.org\/doc\/html\/latest\/dev-tools\/kmemleak.html."},{"key":"e_1_3_2_1_46_1","unstructured":"The kernel development community. [n. d.]. Seccomp BPF (SECure COMPuting with filters). https:\/\/www.kernel.org\/doc\/html\/latest\/userspace-api\/seccomp_filter.html."},{"key":"e_1_3_2_1_47_1","unstructured":"The kernel development community. [n. d.]. Security bugs - The Linux Kernel documentation. https:\/\/www.kernel.org\/doc\/html\/latest\/admm-guide\/security-bugs.html."},{"key":"e_1_3_2_1_48_1","unstructured":"The kernel development community. [n. d.]. The Undefined Behavior Sanitizer - UBSAN. https:\/\/www.kernel.org\/doc\/html\/latest\/dev-tools\/ubsan.html."},{"key":"e_1_3_2_1_49_1","volume-title":"Multi-core Scalable Virtual Machine Fault-tolerance. In 15th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 18). 483--489.","author":"Wang Cheng","unstructured":"Cheng Wang, Xusheng Chen, Weiwei Jia, Boxuan Li, Haoran Qiu, Shixiong Zhao, and Heming Cui. 2018. {PLOVER}: Fast, Multi-core Scalable Virtual Machine Fault-tolerance. In 15th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 18). 483--489."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2017.00031"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.9"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.08.218"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid.2015.30"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304034"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2018.00024"}],"event":{"name":"Middleware '23: 24th International Middleware Conference","location":"Bologna Italy","acronym":"Middleware '23","sponsor":["ACM Association for Computing Machinery","IFIP International Federation for Information Processing"]},"container-title":["Proceedings of the 24th International Middleware Conference on ZZZ"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3590140.3592849","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3590140.3592849","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T16:52:36Z","timestamp":1756486356000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3590140.3592849"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,27]]},"references-count":55,"alternative-id":["10.1145\/3590140.3592849","10.1145\/3590140"],"URL":"https:\/\/doi.org\/10.1145\/3590140.3592849","relation":{},"subject":[],"published":{"date-parts":[[2023,11,27]]},"assertion":[{"value":"2023-11-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}