{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T11:43:30Z","timestamp":1770291810227,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":78,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,12]],"date-time":"2023-07-12T00:00:00Z","timestamp":1689120000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,12]]},"DOI":"10.1145\/3597926.3598106","type":"proceedings-article","created":{"date-parts":[[2023,7,13]],"date-time":"2023-07-13T20:12:53Z","timestamp":1689279173000},"page":"917-928","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Alligator in Vest: A Practical Failure-Diagnosis Framework via Arm Hardware Features"],"prefix":"10.1145","author":[{"given":"Yiming","family":"Zhang","sequence":"first","affiliation":[{"name":"Southern University of Science and Technology, China \/ Hong Kong Polytechnic University, China"}]},{"given":"Yuxin","family":"Hu","sequence":"additional","affiliation":[{"name":"Southern University of Science and Technology, China"}]},{"given":"Haonan","family":"Li","sequence":"additional","affiliation":[{"name":"Southern University of Science and Technology, China"}]},{"given":"Wenxuan","family":"Shi","sequence":"additional","affiliation":[{"name":"Southern University of Science and Technology, China"}]},{"given":"Zhenyu","family":"Ning","sequence":"additional","affiliation":[{"name":"Hunan University, China \/ Southern University of Science and Technology, China"}]},{"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[{"name":"Hong Kong Polytechnic University, China"}]},{"given":"Fengwei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Southern University of Science and Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2023,7,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629594"},{"key":"e_1_3_2_1_2_1","unstructured":"Lars Ole Andersen. 1994. Program analysis and specialization for the C programming language. Ph. D. Dissertation. Citeseer. \t\t\t\t  Lars Ole Andersen. 1994. Program analysis and specialization for the C programming language. Ph. D. Dissertation. Citeseer."},{"key":"e_1_3_2_1_3_1","unstructured":"Arm LTD.. 2017. ARM CoreSight ETM-M33 Technical Reference Manual.  https:\/\/developer.arm.com\/documentation\/100232\/latest\/ \t\t\t\t  Arm LTD.. 2017. ARM CoreSight ETM-M33 Technical Reference Manual.  https:\/\/developer.arm.com\/documentation\/100232\/latest\/"},{"key":"e_1_3_2_1_4_1","unstructured":"Arm LTD.. 2020. DSTREAM family.  https:\/\/developer.arm.com\/tools-and-software\/embedded\/debug-probes\/dstream-family \t\t\t\t  Arm LTD.. 2020. DSTREAM family.  https:\/\/developer.arm.com\/tools-and-software\/embedded\/debug-probes\/dstream-family"},{"key":"e_1_3_2_1_5_1","unstructured":"Arm LTD.. 2020. Embedded Trace Macrocell Architecture Specification ETMv4.0 to ETM4.6.  https:\/\/developer.arm.com\/documentation\/ihi0064\/latest \t\t\t\t  Arm LTD.. 2020. Embedded Trace Macrocell Architecture Specification ETMv4.0 to ETM4.6.  https:\/\/developer.arm.com\/documentation\/ihi0064\/latest"},{"key":"e_1_3_2_1_6_1","unstructured":"Arm LTD.. 2020. Juno r2 ARM Development Platform SoC.  https:\/\/developer.arm.com\/documentation\/ddi0515\/f\/ \t\t\t\t  Arm LTD.. 2020. Juno r2 ARM Development Platform SoC.  https:\/\/developer.arm.com\/documentation\/ddi0515\/f\/"},{"key":"e_1_3_2_1_7_1","unstructured":"Arm LTD.. 2021. Arm TRACE32.  https:\/\/developer.arm.com\/solutions\/internet-of-things\/tools\/trace32 \t\t\t\t  Arm LTD.. 2021. Arm TRACE32.  https:\/\/developer.arm.com\/solutions\/internet-of-things\/tools\/trace32"},{"key":"e_1_3_2_1_8_1","unstructured":"Arm LTD.. 2021. Arm\u00ae Architecture Reference Manual.  https:\/\/developer.arm.com\/documentation\/ddi0487\/latest \t\t\t\t  Arm LTD.. 2021. Arm\u00ae Architecture Reference Manual.  https:\/\/developer.arm.com\/documentation\/ddi0487\/latest"},{"key":"e_1_3_2_1_9_1","unstructured":"Arm LTD.. 2021. CoreSight Components Technical Reference Manual.  https:\/\/developer.arm.com\/documentation\/ddi0314\/h\/trace-port-interface-unit \t\t\t\t  Arm LTD.. 2021. CoreSight Components Technical Reference Manual.  https:\/\/developer.arm.com\/documentation\/ddi0314\/h\/trace-port-interface-unit"},{"key":"e_1_3_2_1_10_1","unstructured":"Arm LTD.. 2021. Learn the architecture: Understanding trace.  https:\/\/developer.arm.com\/documentation\/102119\/latest\/ \t\t\t\t  Arm LTD.. 2021. Learn the architecture: Understanding trace.  https:\/\/developer.arm.com\/documentation\/102119\/latest\/"},{"key":"e_1_3_2_1_11_1","unstructured":"BenjaminSchubert. 2015. bugbase.  https:\/\/github.com\/dslab-epfl\/bugbase\/tree\/master\/data \t\t\t\t  BenjaminSchubert. 2015. bugbase.  https:\/\/github.com\/dslab-epfl\/bugbase\/tree\/master\/data"},{"key":"e_1_3_2_1_12_1","volume-title":"USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201910)","author":"Bergan Tom","year":"2010","unstructured":"Tom Bergan , Nicholas Hunt , Luis Ceze , and Steven D Gribble . 2010 . Deterministic Process Groups in dOS .. In USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201910) . Tom Bergan, Nicholas Hunt, Luis Ceze, and Steven D Gribble. 2010. Deterministic Process Groups in dOS.. In USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201910)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134760.1220164"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134760.1220164"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 29th USENIX Conference on Security Symposium (USENIX Security\u201920)","author":"Blazytko Tim","year":"2020","unstructured":"Tim Blazytko , Moritz Schl\u00f6gel , Cornelius Aschermann , Ali Abbasi , Joel Frank , Simon W\u00f6rner , and Thorsten Holz . 2020 . AURORA: Statistical crash analysis for automated root cause explanation . In Proceedings of the 29th USENIX Conference on Security Symposium (USENIX Security\u201920) . Tim Blazytko, Moritz Schl\u00f6gel, Cornelius Aschermann, Ali Abbasi, Joel Frank, Simon W\u00f6rner, and Thorsten Holz. 2020. AURORA: Statistical crash analysis for automated root cause explanation. In Proceedings of the 29th USENIX Conference on Security Symposium (USENIX Security\u201920)."},{"key":"e_1_3_2_1_16_1","volume-title":"Star: Stack trace based automatic crash reproduction via symbolic execution","author":"Chen Ning","year":"2014","unstructured":"Ning Chen and Sunghun Kim . 2014 . Star: Stack trace based automatic crash reproduction via symbolic execution . IEEE transactions on software engineering, 41, 2 (2014), 198\u2013220. Ning Chen and Sunghun Kim. 2014. Star: Stack trace based automatic crash reproduction via symbolic execution. IEEE transactions on software engineering, 41, 2 (2014), 198\u2013220."},{"key":"e_1_3_2_1_17_1","volume-title":"2009 IEEE 31st International Conference on Software Engineering (ICSE\u201909)","author":"Chilimbi Trishul M","year":"2009","unstructured":"Trishul M Chilimbi , Ben Liblit , Krishna Mehra , Aditya V Nori , and Kapil Vaswani . 2009 . Holmes: Effective statistical debugging via efficient path profiling . In 2009 IEEE 31st International Conference on Software Engineering (ICSE\u201909) . Trishul M Chilimbi, Ben Liblit, Krishna Mehra, Aditya V Nori, and Kapil Vaswani. 2009. Holmes: Effective statistical debugging via efficient path profiling. In 2009 IEEE 31st International Conference on Software Engineering (ICSE\u201909)."},{"key":"e_1_3_2_1_18_1","volume-title":"13th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201918)","author":"Cui Weidong","year":"2018","unstructured":"Weidong Cui , Xinyang Ge , Baris Kasikci , Ben Niu , Upamanyu Sharma , Ruoyu Wang , and Insu Yun . 2018 . REPT: Reverse debugging of failures in deployed software . In 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201918) . Weidong Cui, Xinyang Ge, Baris Kasikci, Ben Niu, Upamanyu Sharma, Ruoyu Wang, and Insu Yun. 2018. REPT: Reverse debugging of failures in deployed software. In 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201918)."},{"key":"e_1_3_2_1_19_1","volume-title":"2016 IEEE\/ACM 38th International Conference on Software Engineering (ICSE\u201916)","author":"Cui Weidong","year":"2016","unstructured":"Weidong Cui , Marcus Peinado , Sang Kil Cha , Yanick Fratantonio , and Vasileios P Kemerlis . 2016 . Retracer: Triaging crashes by reverse execution from partial memory dumps . In 2016 IEEE\/ACM 38th International Conference on Software Engineering (ICSE\u201916) . Weidong Cui, Marcus Peinado, Sang Kil Cha, Yanick Fratantonio, and Vasileios P Kemerlis. 2016. Retracer: Triaging crashes by reverse execution from partial memory dumps. In 2016 IEEE\/ACM 38th International Conference on Software Engineering (ICSE\u201916)."},{"key":"e_1_3_2_1_20_1","volume-title":"11th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201914)","author":"Devecsery David","year":"2014","unstructured":"David Devecsery , Michael Chow , Xianzheng Dou , Jason Flinn , and Peter M Chen . 2014 . Eidetic systems . In 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201914) . David Devecsery, Michael Chow, Xianzheng Dou, Jason Flinn, and Peter M Chen. 2014. Eidetic systems. In 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201914)."},{"key":"e_1_3_2_1_21_1","volume-title":"2020 IEEE Symposium on Security and Privacy (SP\u201920)","author":"Dinesh Sushant","year":"2020","unstructured":"Sushant Dinesh , Nathan Burow , Dongyan Xu , and Mathias Payer . 2020 . Retrowrite: Statically instrumenting cots binaries for fuzzing and sanitization . In 2020 IEEE Symposium on Security and Privacy (SP\u201920) . Sushant Dinesh, Nathan Burow, Dongyan Xu, and Mathias Payer. 2020. Retrowrite: Statically instrumenting cots binaries for fuzzing and sanitization. In 2020 IEEE Symposium on Security and Privacy (SP\u201920)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2642951"},{"key":"e_1_3_2_1_23_1","volume-title":"HART: Hardware-Assisted Kernel Module Tracing on Arm. In Computer Security (ESORICS\u201920).","author":"Du Yunlan","year":"2020","unstructured":"Yunlan Du , Zhenyu Ning , Jun Xu , Zhilong Wang , Yueh-Hsun Lin , Fengwei Zhang , Xinyu Xing , and Bing Mao . 2020 . HART: Hardware-Assisted Kernel Module Tracing on Arm. In Computer Security (ESORICS\u201920). Yunlan Du, Zhenyu Ning, Jun Xu, Zhilong Wang, Yueh-Hsun Lin, Fengwei Zhang, Xinyu Xing, and Bing Mao. 2020. HART: Hardware-Assisted Kernel Module Tracing on Arm. In Computer Security (ESORICS\u201920)."},{"key":"e_1_3_2_1_24_1","volume-title":"Proc. 2002 Symp. Operating Systems Design and Implementation (OSDI\u201902)","author":"Dunlap GW","year":"2002","unstructured":"GW Dunlap , ST King , S Cinar , M Basrai , and PM Chen . 2002 . Enabling Intrusion Analysis through Virtual Machine Logging and Replay . In Proc. 2002 Symp. Operating Systems Design and Implementation (OSDI\u201902) . GW Dunlap, ST King, S Cinar, M Basrai, and PM Chen. 2002. Enabling Intrusion Analysis through Virtual Machine Logging and Replay. In Proc. 2002 Symp. Operating Systems Design and Implementation (OSDI\u201902)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Jakob Engblom Daniel Aarno and Bengt Werner. 2010. Full-system simulation from embedded to high-performance systems. In Processor and System-on-Chip Simulation (PSCS\u201910). \t\t\t\t  Jakob Engblom Daniel Aarno and Bengt Werner. 2010. Full-system simulation from embedded to high-performance systems. In Processor and System-on-Chip Simulation (PSCS\u201910).","DOI":"10.1007\/978-1-4419-6175-4_3"},{"key":"e_1_3_2_1_26_1","volume-title":"2020 USENIX Annual Technical Conference (USENIX ATC 20)","author":"Ge Xinyang","year":"2020","unstructured":"Xinyang Ge , Ben Niu , and Weidong Cui . 2020 . Reverse debugging of kernel failures in deployed systems . In 2020 USENIX Annual Technical Conference (USENIX ATC 20) . 281\u2013292. Xinyang Ge, Ben Niu, and Weidong Cui. 2020. Reverse debugging of kernel failures in deployed systems. In 2020 USENIX Annual Technical Conference (USENIX ATC 20). 281\u2013292."},{"key":"e_1_3_2_1_27_1","unstructured":"geeksforgeeks. 2017. Pure Functions.  https:\/\/www.geeksforgeeks.org\/pure-functions\/ \t\t\t\t  geeksforgeeks. 2017. Pure Functions.  https:\/\/www.geeksforgeeks.org\/pure-functions\/"},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles (SOSP\u201909)","author":"Glerum Kirk","year":"2009","unstructured":"Kirk Glerum , Kinshuman Kinshumann , Steve Greenberg , Gabriel Aul , Vince Orgovan , Greg Nichols , David Grant , Gretchen Loihle , and Galen Hunt . 2009 . Debugging in the (very) large: ten years of implementation and experience . In Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles (SOSP\u201909) . Kirk Glerum, Kinshuman Kinshumann, Steve Greenberg, Gabriel Aul, Vince Orgovan, Greg Nichols, David Grant, Gretchen Loihle, and Galen Hunt. 2009. Debugging in the (very) large: ten years of implementation and experience. In Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles (SOSP\u201909)."},{"key":"e_1_3_2_1_29_1","volume-title":"Cray User Group Conference (CUGC\u201908)","author":"Gottbrath Chris","year":"2008","unstructured":"Chris Gottbrath . 2008 . Reverse debugging with the TotalView debugger . In Cray User Group Conference (CUGC\u201908) . Chris Gottbrath. 2008. Reverse debugging with the TotalView debugger. In Cray User Group Conference (CUGC\u201908)."},{"key":"e_1_3_2_1_30_1","unstructured":"Brendan Gregg. 2019. DTrace Tools.  http:\/\/www.brendangregg.com\/dtrace.html \t\t\t\t  Brendan Gregg. 2019. DTrace Tools.  http:\/\/www.brendangregg.com\/dtrace.html"},{"key":"e_1_3_2_1_31_1","volume-title":"Mac OS X and FreeBSD","author":"Gregg Brendan","unstructured":"Brendan Gregg and Jim Mauro . 2011. DTrace: Dynamic Tracing in Oracle Solaris , Mac OS X and FreeBSD ( 1 st edition ed.). Brendan Gregg and Jim Mauro. 2011. DTrace: Dynamic Tracing in Oracle Solaris, Mac OS X and FreeBSD (1st edition ed.).","edition":"1"},{"key":"e_1_3_2_1_32_1","volume-title":"Rerun: Exploiting episodes for lightweight memory race recording. ACM SIGARCH computer architecture news, 36, 3","author":"Hower Derek R","year":"2008","unstructured":"Derek R Hower and Mark D Hill . 2008 . Rerun: Exploiting episodes for lightweight memory race recording. ACM SIGARCH computer architecture news, 36, 3 (2008). Derek R Hower and Mark D Hill. 2008. Rerun: Exploiting episodes for lightweight memory race recording. ACM SIGARCH computer architecture news, 36, 3 (2008)."},{"key":"e_1_3_2_1_33_1","unstructured":"hwangcc23. 2021. ptm2human: ARM PTM (and ETMv4) trace to human-readable format.  https:\/\/github.com\/hwangcc23\/ptm2human \t\t\t\t  hwangcc23. 2021. ptm2human: ARM PTM (and ETMv4) trace to human-readable format.  https:\/\/github.com\/hwangcc23\/ptm2human"},{"key":"e_1_3_2_1_34_1","unstructured":"jieyu. 2013. concurrency-bugs.  https:\/\/github.com\/jieyu\/concurrency-bugs \t\t\t\t  jieyu. 2013. concurrency-bugs.  https:\/\/github.com\/jieyu\/concurrency-bugs"},{"key":"e_1_3_2_1_35_1","unstructured":"jieyu. 2015. maple bug bases.  https:\/\/github.com\/jieyu\/maple\/tree\/master\/example \t\t\t\t  jieyu. 2015. maple bug bases.  https:\/\/github.com\/jieyu\/maple\/tree\/master\/example"},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of the ACM international conference on Object oriented programming systems languages and applications (OOPSLA\u201910)","author":"Jin Guoliang","year":"2010","unstructured":"Guoliang Jin , Aditya Thakur , Ben Liblit , and Shan Lu . 2010 . Instrumentation and sampling strategies for cooperative concurrency bug isolation . In Proceedings of the ACM international conference on Object oriented programming systems languages and applications (OOPSLA\u201910) . Guoliang Jin, Aditya Thakur, Ben Liblit, and Shan Lu. 2010. Instrumentation and sampling strategies for cooperative concurrency bug isolation. In Proceedings of the ACM international conference on Object oriented programming systems languages and applications (OOPSLA\u201910)."},{"key":"e_1_3_2_1_37_1","volume-title":"2012 34th International Conference on Software Engineering (ICSE). 474\u2013484","author":"Jin Wei","year":"2012","unstructured":"Wei Jin and Alessandro Orso . 2012 . Bugredux: Reproducing field failures for in-house debugging . In 2012 34th International Conference on Software Engineering (ICSE). 474\u2013484 . Wei Jin and Alessandro Orso. 2012. Bugredux: Reproducing field failures for in-house debugging. In 2012 34th International Conference on Software Engineering (ICSE). 474\u2013484."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132767"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815412"},{"key":"e_1_3_2_1_40_1","unstructured":"kdlucas. 2018. byte-unixbench.  https:\/\/github.com\/kdlucas\/byte-unixbench \t\t\t\t  kdlucas. 2018. byte-unixbench.  https:\/\/github.com\/kdlucas\/byte-unixbench"},{"key":"e_1_3_2_1_41_1","volume-title":"Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS\u201920)","author":"Liang Jiashuo","year":"2020","unstructured":"Jiashuo Liang , Guancheng Li , Chao Zhang , Ming Yuan , Xingman Chen , and Xinhui Han . 2020 . RIPT\u2013An Efficient Multi-Core Record-Replay System . In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS\u201920) . Jiashuo Liang, Guancheng Li, Chao Zhang, Ming Yuan, Xingman Chen, and Xinhui Han. 2020. RIPT\u2013An Efficient Multi-Core Record-Replay System. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS\u201920)."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","unstructured":"Ben Liblit Alex Aiken Alice X Zheng and Michael I Jordan. 2003. Bug isolation via remote program sampling. ACM Sigplan Notices. \t\t\t\t  Ben Liblit Alex Aiken Alice X Zheng and Michael I Jordan. 2003. Bug isolation via remote program sampling. ACM Sigplan Notices.","DOI":"10.1145\/781131.781148"},{"key":"e_1_3_2_1_43_1","volume-title":"Proceedings of the Workshop on Remote Analysis and Measurement of Software Systems.","author":"Liblit Ben","year":"2003","unstructured":"Ben Liblit , Alex Aiken , Alice X Zheng , and Michael I Jordan . 2003 . Sampling user executions for bug isolation . In Proceedings of the Workshop on Remote Analysis and Measurement of Software Systems. Ben Liblit, Alex Aiken, Alice X Zheng, and Michael I Jordan. 2003. Sampling user executions for bug isolation. In Proceedings of the Workshop on Remote Analysis and Measurement of Software Systems."},{"key":"e_1_3_2_1_44_1","unstructured":"Linaro. 2021. arm-reference-platforms.  https:\/\/git.linaro.org\/landing-teams\/working\/arm\/arm-reference-platforms.git\/about\/docs\/user-guide.rst \t\t\t\t  Linaro. 2021. arm-reference-platforms.  https:\/\/git.linaro.org\/landing-teams\/working\/arm\/arm-reference-platforms.git\/about\/docs\/user-guide.rst"},{"key":"e_1_3_2_1_45_1","unstructured":"Linux man-pages project. 2021. core(5) \u2014 Linux manual page.  https:\/\/man7.org\/linux\/man-pages\/man5\/core.5.html \t\t\t\t  Linux man-pages project. 2021. core(5) \u2014 Linux manual page.  https:\/\/man7.org\/linux\/man-pages\/man5\/core.5.html"},{"key":"e_1_3_2_1_46_1","unstructured":"Linux man-pages project. 2021. gcore(1) \u2014 Linux manual page.  https:\/\/man7.org\/linux\/man-pages\/man1\/gcore.1.html \t\t\t\t  Linux man-pages project. 2021. gcore(1) \u2014 Linux manual page.  https:\/\/man7.org\/linux\/man-pages\/man1\/gcore.1.html"},{"key":"e_1_3_2_1_47_1","unstructured":"Linux man-pages project. 2021. ptrace(2) - Linux manual page.  https:\/\/man7.org\/linux\/man-pages\/man2\/ptrace.2.html \t\t\t\t  Linux man-pages project. 2021. ptrace(2) - Linux manual page.  https:\/\/man7.org\/linux\/man-pages\/man2\/ptrace.2.html"},{"key":"e_1_3_2_1_48_1","unstructured":"Hongyu Liu Sam Silvestro Wei Wang Chen Tian and Tongping Liu. 2018. IReplayer: In-Situ and Identical Record-and-Replay for Multithreaded Applications. SIGPLAN Not.. \t\t\t\t  Hongyu Liu Sam Silvestro Wei Wang Chen Tian and Tongping Liu. 2018. IReplayer: In-Situ and Identical Record-and-Replay for Multithreaded Applications. SIGPLAN Not.."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346323"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"crossref","unstructured":"Nuno Machado Paolo Romano and Lu\u00eds Rodrigues. 2018. CoopREP: Cooperative record and replay of concurrency bugs. Software Testing Verification and Reliability (STVR\u201918). \t\t\t\t  Nuno Machado Paolo Romano and Lu\u00eds Rodrigues. 2018. CoopREP: Cooperative record and replay of concurrency bugs. Software Testing Verification and Reliability (STVR\u201918).","DOI":"10.1002\/stvr.1645"},{"key":"e_1_3_2_1_51_1","volume-title":"Towards practical default-on multi-core record\/replay. ACM SIGPLAN Notices (SIGPLAN\u201917), 52, 4","author":"Mashtizadeh Ali Jos\u00e9","year":"2017","unstructured":"Ali Jos\u00e9 Mashtizadeh , Tal Garfinkel , David Terei , David Mazieres , and Mendel Rosenblum . 2017. Towards practical default-on multi-core record\/replay. ACM SIGPLAN Notices (SIGPLAN\u201917), 52, 4 ( 2017 ). Ali Jos\u00e9 Mashtizadeh, Tal Garfinkel, David Terei, David Mazieres, and Mendel Rosenblum. 2017. Towards practical default-on multi-core record\/replay. ACM SIGPLAN Notices (SIGPLAN\u201917), 52, 4 (2017)."},{"key":"e_1_3_2_1_52_1","unstructured":"Desnoyers Mathieu. 2021. Using the Linux Kernel Tracepoints \u2014 The Linux Kernel documentation.  https:\/\/www.kernel.org\/doc\/html\/latest\/trace\/tracepoints.html \t\t\t\t  Desnoyers Mathieu. 2021. Using the Linux Kernel Tracepoints \u2014 The Linux Kernel documentation.  https:\/\/www.kernel.org\/doc\/html\/latest\/trace\/tracepoints.html"},{"key":"e_1_3_2_1_53_1","volume-title":"Delorean: Recording and deterministically replaying shared-memory multiprocessor execution ef? ciently. ACM SIGARCH Computer Architecture News (SIGARCH\u201908), 36, 3","author":"Montesinos Pablo","year":"2008","unstructured":"Pablo Montesinos , Luis Ceze , and Josep Torrellas . 2008 . Delorean: Recording and deterministically replaying shared-memory multiprocessor execution ef? ciently. ACM SIGARCH Computer Architecture News (SIGARCH\u201908), 36, 3 (2008). Pablo Montesinos, Luis Ceze, and Josep Torrellas. 2008. Delorean: Recording and deterministically replaying shared-memory multiprocessor execution ef? ciently. ACM SIGARCH Computer Architecture News (SIGARCH\u201908), 36, 3 (2008)."},{"key":"e_1_3_2_1_54_1","volume-title":"2019 IEEE Symposium on Security and Privacy (SP\u201919)","author":"Nagy Stefan","year":"2019","unstructured":"Stefan Nagy and Matthew Hicks . 2019 . Full-speed fuzzing: Reducing fuzzing overhead through coverage-guided tracing . In 2019 IEEE Symposium on Security and Privacy (SP\u201919) . Stefan Nagy and Matthew Hicks. 2019. Full-speed fuzzing: Reducing fuzzing overhead through coverage-guided tracing. In 2019 IEEE Symposium on Security and Privacy (SP\u201919)."},{"key":"e_1_3_2_1_55_1","volume-title":"Ninja: Towards Transparent Tracing and Debugging on ARM. In 26th USENIX Security Symposium (USENIX Security\u201917)","author":"Ning Zhenyu","year":"2017","unstructured":"Zhenyu Ning and Fengwei Zhang . 2017 . Ninja: Towards Transparent Tracing and Debugging on ARM. In 26th USENIX Security Symposium (USENIX Security\u201917) . Zhenyu Ning and Fengwei Zhang. 2017. Ninja: Towards Transparent Tracing and Debugging on ARM. In 26th USENIX Security Symposium (USENIX Security\u201917)."},{"key":"e_1_3_2_1_56_1","volume-title":"Engineering Record and Replay for Deployability. In 2017 USENIX Annual Technical Conference (USENIX ATC\u201917)","author":"Callahan Robert O\u2019","year":"2017","unstructured":"Robert O\u2019 Callahan , Chris Jones , Nathan Froyd , Kyle Huey , Albert Noll , and Nimrod Partush . 2017 . Engineering Record and Replay for Deployability. In 2017 USENIX Annual Technical Conference (USENIX ATC\u201917) . Robert O\u2019 Callahan, Chris Jones, Nathan Froyd, Kyle Huey, Albert Noll, and Nimrod Partush. 2017. Engineering Record and Replay for Deployability. In 2017 USENIX Annual Technical Conference (USENIX ATC\u201917)."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629593"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772954.1772958"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2155620.2155646"},{"key":"e_1_3_2_1_60_1","unstructured":"James R. 2013. Intel Processor Tracing.  https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/blogs\/processor-tracing.html \t\t\t\t  James R. 2013. Intel Processor Tracing.  https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/blogs\/processor-tracing.html"},{"key":"e_1_3_2_1_61_1","unstructured":"retrage. 2018. SQLite3 Benchmark.  https:\/\/github.com\/ukontainer\/sqlite-bench \t\t\t\t  retrage. 2018. SQLite3 Benchmark.  https:\/\/github.com\/ukontainer\/sqlite-bench"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"crossref","unstructured":"Michiel Ronsse and Koen De Bosschere. 1999. RecPlay: a fully integrated practical record\/replay system. ACM Transactions on Computer Systems (TOCS\u201999). \t\t\t\t  Michiel Ronsse and Koen De Bosschere. 1999. RecPlay: a fully integrated practical record\/replay system. ACM Transactions on Computer Systems (TOCS\u201999).","DOI":"10.1145\/312203.312214"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2688204.2688205"},{"key":"e_1_3_2_1_64_1","unstructured":"Segger.. 2021. J-Trace PRO.  https:\/\/www.segger.com\/products\/debug-probes\/j-trace\/ \t\t\t\t  Segger.. 2021. J-Trace PRO.  https:\/\/www.segger.com\/products\/debug-probes\/j-trace\/"},{"key":"e_1_3_2_1_65_1","unstructured":"Segger.. 2021. SEGGER J-Links.  https:\/\/www.segger.com\/downloads\/jlink\/ \t\t\t\t  Segger.. 2021. SEGGER J-Links.  https:\/\/www.segger.com\/downloads\/jlink\/"},{"key":"e_1_3_2_1_66_1","unstructured":"Inc Sysdig. 2021. draios\/sysdig.  https:\/\/github.com\/draios\/sysdig \t\t\t\t  Inc Sysdig. 2021. draios\/sysdig.  https:\/\/github.com\/draios\/sysdig"},{"key":"e_1_3_2_1_67_1","unstructured":"The strace developers. 2021. strace\/strace.  https:\/\/github.com\/strace\/strace \t\t\t\t  The strace developers. 2021. strace\/strace.  https:\/\/github.com\/strace\/strace"},{"key":"e_1_3_2_1_68_1","unstructured":"thinkingfish. 2014. twemperf.  https:\/\/github.com\/twitter-archive\/twemperf \t\t\t\t  thinkingfish. 2014. twemperf.  https:\/\/github.com\/twitter-archive\/twemperf"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"crossref","unstructured":"Kaushik Veeraraghavan Dongyoon Lee Benjamin Wester Jessica Ouyang Peter M Chen Jason Flinn and Satish Narayanasamy. 2012. DoublePlay: Parallelizing sequential logging and replay. ACM Transactions on Computer Systems (TOCS\u201912). \t\t\t\t  Kaushik Veeraraghavan Dongyoon Lee Benjamin Wester Jessica Ouyang Peter M Chen Jason Flinn and Satish Narayanasamy. 2012. DoublePlay: Parallelizing sequential logging and replay. ACM Transactions on Computer Systems (TOCS\u201912).","DOI":"10.1145\/1950365.1950370"},{"key":"e_1_3_2_1_70_1","volume-title":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS\u201916)","author":"Xu Jun","year":"2016","unstructured":"Jun Xu , Dongliang Mu , Ping Chen , Xinyu Xing , Pei Wang , and Peng Liu . 2016 . Credal: Towards locating a memory corruption vulnerability with your core dump . In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS\u201916) . Jun Xu, Dongliang Mu, Ping Chen, Xinyu Xing, Pei Wang, and Peng Liu. 2016. Credal: Towards locating a memory corruption vulnerability with your core dump. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS\u201916)."},{"key":"e_1_3_2_1_71_1","volume-title":"26th USENIX Security Symposium (USENIX Security\u201917)","author":"Xu Jun","year":"2017","unstructured":"Jun Xu , Dongliang Mu , Xinyu Xing , Peng Liu , Ping Chen , and Bing Mao . 2017 . Postmortem program analysis with hardware-enhanced post-crash artifacts . In 26th USENIX Security Symposium (USENIX Security\u201917) . Jun Xu, Dongliang Mu, Xinyu Xing, Peng Liu, Ping Chen, and Bing Mao. 2017. Postmortem program analysis with hardware-enhanced post-crash artifacts. In 26th USENIX Security Symposium (USENIX Security\u201917)."},{"key":"e_1_3_2_1_72_1","volume-title":"ARCUS: Symbolic Root Cause Analysis of Exploits in Production Systems. In 30th USENIX Security Symposium (USENIX Security\u201921)","author":"Yagemann Carter","year":"2021","unstructured":"Carter Yagemann , Matthew Pruett , Simon P Chung , Kennon Bittick , Brendan Saltaformaggio , and Wenke Lee . 2021 . ARCUS: Symbolic Root Cause Analysis of Exploits in Production Systems. In 30th USENIX Security Symposium (USENIX Security\u201921) . Carter Yagemann, Matthew Pruett, Simon P Chung, Kennon Bittick, Brendan Saltaformaggio, and Wenke Lee. 2021. ARCUS: Symbolic Root Cause Analysis of Exploits in Production Systems. In 30th USENIX Security Symposium (USENIX Security\u201921)."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"crossref","unstructured":"Jie Yu and Satish Narayanasamy. 2009. A case for an interleaving constrained shared-memory multi-processor. ACM SIGARCH Computer Architecture News (CAN\u201909). \t\t\t\t  Jie Yu and Satish Narayanasamy. 2009. A case for an interleaving constrained shared-memory multi-processor. ACM SIGARCH Computer Architecture News (CAN\u201909).","DOI":"10.1145\/1555754.1555796"},{"key":"e_1_3_2_1_74_1","volume-title":"Proceedings of the ACM international conference on Object oriented programming systems languages and applications (OOPSLA\u201912)","author":"Yu Jie","year":"2012","unstructured":"Jie Yu , Satish Narayanasamy , Cristiano Pereira , and Gilles Pokam . 2012 . Maple: A coverage-driven testing tool for multithreaded programs . In Proceedings of the ACM international conference on Object oriented programming systems languages and applications (OOPSLA\u201912) . Jie Yu, Satish Narayanasamy, Cristiano Pereira, and Gilles Pokam. 2012. Maple: A coverage-driven testing tool for multithreaded programs. In Proceedings of the ACM international conference on Object oriented programming systems languages and applications (OOPSLA\u201912)."},{"key":"e_1_3_2_1_75_1","volume-title":"Proceedings of the 5th European conference on Computer systems (EUROSYS\u201910)","author":"Zamfir Cristian","year":"2010","unstructured":"Cristian Zamfir and George Candea . 2010 . Execution synthesis: a technique for automated software debugging . In Proceedings of the 5th European conference on Computer systems (EUROSYS\u201910) . Cristian Zamfir and George Candea. 2010. Execution synthesis: a technique for automated software debugging. In Proceedings of the 5th European conference on Computer systems (EUROSYS\u201910)."},{"key":"e_1_3_2_1_76_1","volume-title":"SHELTER: Extending Arm CCA with Isolation in User Space. In 32nd USENIX Security Symposium (USENIX Security\u201923)","author":"Zhang Yiming","year":"2023","unstructured":"Yiming Zhang , Yuxin Hu , Zhenyu Ning , Fengwei Zhang , Xiapu Luo , Haoyang Huang , Shoumeng Yan , and Zhengyu He . 2023 . SHELTER: Extending Arm CCA with Isolation in User Space. In 32nd USENIX Security Symposium (USENIX Security\u201923) . Yiming Zhang, Yuxin Hu, Zhenyu Ning, Fengwei Zhang, Xiapu Luo, Haoyang Huang, Shoumeng Yan, and Zhengyu He. 2023. SHELTER: Extending Arm CCA with Isolation in User Space. In 32nd USENIX Security Symposium (USENIX Security\u201923)."},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359650"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534410"}],"event":{"name":"ISSTA '23: 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis","location":"Seattle WA USA","acronym":"ISSTA '23","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","AITO"]},"container-title":["Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3597926.3598106","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3597926.3598106","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:48:42Z","timestamp":1750182522000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3597926.3598106"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,12]]},"references-count":78,"alternative-id":["10.1145\/3597926.3598106","10.1145\/3597926"],"URL":"https:\/\/doi.org\/10.1145\/3597926.3598106","relation":{},"subject":[],"published":{"date-parts":[[2023,7,12]]},"assertion":[{"value":"2023-07-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}