{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T12:08:37Z","timestamp":1763381317096,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":66,"publisher":"ACM","funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS-2441284"],"award-info":[{"award-number":["CNS-2441284"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,17]]},"DOI":"10.1145\/3772356.3772385","type":"proceedings-article","created":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T12:02:48Z","timestamp":1763380968000},"page":"335-343","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Once Bitten, Still Shy: Can We Prevent Cloud Systems from Repeating Their Mistakes?"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-8419-0114","authenticated-orcid":false,"given":"Dimas","family":"Parikesit","sequence":"first","affiliation":[{"name":"University of Virginia, Charlottesville, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-3056-5729","authenticated-orcid":false,"given":"Chang","family":"Lou","sequence":"additional","affiliation":[{"name":"University of Virginia, Charlottesville, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,11,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Aws outage analysis december 7 2021. https:\/\/www.thousandeyes.com\/blog\/aws-outage-analysis-dec-7-2021."},{"key":"e_1_3_2_1_2_1","unstructured":"Github hit with multiple back-to-back outages. https:\/\/www.zdnet.com\/article\/github-hit-with-multiple-back-to-back-outages\/."},{"key":"e_1_3_2_1_3_1","unstructured":"HBASE-27671: Client should not be able to restore\/clone a snapshot after it's ttl has expired. https:\/\/issues.apache.org\/jira\/browse\/HBASE-27671."},{"key":"e_1_3_2_1_4_1","unstructured":"HBASE-28704: The expired snapshot can be read by copytable or exportsnapshot. https:\/\/issues.apache.org\/jira\/browse\/HBASE-28704."},{"key":"e_1_3_2_1_5_1","unstructured":"Hbase-29296: Missing critical snapshot expiration checks. https:\/\/issues.apache.org\/jira\/browse\/HBASE-29296."},{"key":"e_1_3_2_1_6_1","unstructured":"HDFS-13924: Handle blockmissingexception when reading from observer. https:\/\/issues.apache.org\/jira\/browse\/HDFS-13924."},{"key":"e_1_3_2_1_7_1","unstructured":"HDFS-16732: Avoid get location from observer when the block report is delayed. https:\/\/issues.apache.org\/jira\/browse\/HDFS-16732."},{"key":"e_1_3_2_1_8_1","unstructured":"Hdfs-17768: Observer namenode network delay causing empty block location for getbatchedlisting. https:\/\/issues.apache.org\/jira\/browse\/HDFS-17768."},{"key":"e_1_3_2_1_9_1","unstructured":"Introducing openai o3 and o4-mini. https:\/\/openai.com\/index\/introducing-o3-and-o4-mini\/."},{"key":"e_1_3_2_1_10_1","unstructured":"It glue incident #dgrgk4kvz4n7. https:\/\/status.itglue.com\/incidents\/dgrgk4kvz4n7."},{"key":"e_1_3_2_1_11_1","unstructured":"It glue incident #z8r5glspbq3m. https:\/\/status.itglue.com\/incidents\/z8r5glspbq3m."},{"key":"e_1_3_2_1_12_1","unstructured":"Microsoft hit with teams microsoft 365 outage issues. https:\/\/www.crn.com\/news\/cloud\/microsoft-hit-with-teams-microsoft-365-outage-issues."},{"key":"e_1_3_2_1_13_1","unstructured":"New embedding models and api updates. https:\/\/openai.com\/index\/new-embedding-models-and-api-updates\/."},{"key":"e_1_3_2_1_14_1","unstructured":"Psn appears to be down for ps4 and ps5 right now. https:\/\/www.androidcentral.com\/psn-appears-be-down-ps4-and-ps5-right-now."},{"key":"e_1_3_2_1_15_1","unstructured":"Psn outage: Playstation network down for ps5 and ps4. https:\/\/www.androidcentral.com\/psn-outage-playstation-network-down-ps5-and-ps4."},{"key":"e_1_3_2_1_16_1","unstructured":"ZooKeeper-1208: Ephemeral node not removed after the client session is long gone. https:\/\/issues.apache.org\/jira\/browse\/ZOOKEEPER-1208."},{"key":"e_1_3_2_1_17_1","unstructured":"ZooKeeper-1496: Ephemeral node not getting cleared even after client has exited. https:\/\/issues.apache.org\/jira\/browse\/ZOOKEEPER-1496."},{"key":"e_1_3_2_1_18_1","first-page":"16","volume-title":"Proceedings of the 29th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL '02","author":"Ammons G.","year":"2002","unstructured":"G. Ammons, R. Bod\u00edk, and J. R. Larus. Mining specifications. In Proceedings of the 29th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL '02, page 4\u201316, Portland, Oregon, 2002."},{"key":"e_1_3_2_1_19_1","first-page":"1091","volume-title":"Proceedings of the Twentieth European Conference on Computer Systems, EuroSys '25","author":"Bai J.-J.","year":"2025","unstructured":"J.-J. Bai. Besa: Extending bugs triggered by runtime testing via static analysis. In Proceedings of the Twentieth European Conference on Computer Systems, EuroSys '25, page 1077\u20131091, Rotterdam, Netherlands, 2025."},{"key":"e_1_3_2_1_20_1","first-page":"479","volume-title":"Proceedings of the 36th International Conference on Software Engineering, ICSE 2014","author":"Beschastnikh I.","year":"2014","unstructured":"I. Beschastnikh, Y. Brun, M. D. Ernst, and A. Krishnamurthy. Inferring models of concurrent systems from logs of their behavior with csight. In Proceedings of the 36th International Conference on Software Engineering, ICSE 2014, page 468\u2013479, Hyderabad, India, 2014."},{"key":"e_1_3_2_1_21_1","first-page":"399","volume-title":"Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering, ESEC\/FSE 2013","author":"Beyer D.","year":"2013","unstructured":"D. Beyer, S. L\u00f6we, E. Novikov, A. Stahlbauer, and P. Wendler. Precision reuse for efficient regression verification. In Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering, ESEC\/FSE 2013, page 389\u2013399, Saint Petersburg, Russia, 2013."},{"key":"e_1_3_2_1_22_1","first-page":"850","volume-title":"Proceedings of the ACM SIGOPS 28th Symposium on Operating Systems Principles, SOSP '21","author":"Bornholt J.","year":"2021","unstructured":"J. Bornholt, R. Joshi, V. Astrauskas, B. Cully, B. Kragl, S. Markle, K. Sauri, D. Schleit, G. Slatton, S. Tasiran, J. Van Geffen, and A. Warfield. Using lightweight formal methods to validate a key-value storage node in amazon s3. In Proceedings of the ACM SIGOPS 28th Symposium on Operating Systems Principles, SOSP '21, page 836\u2013850, Virtual Event, Germany, 2021."},{"key":"e_1_3_2_1_23_1","first-page":"688","volume-title":"Proceedings of the Nineteenth European Conference on Computer Systems, EuroSys '24","author":"Chen Y.","year":"2024","unstructured":"Y. Chen, H. Xie, M. Ma, Y. Kang, X. Gao, L. Shi, Y. Cao, X. Gao, H. Fan, M. Wen, J. Zeng, S. Ghosh, X. Zhang, C. Zhang, Q. Lin, S. Rajmohan, D. Zhang, and T. Xu. Automatic root cause analysis via large language models for cloud incidents. In Proceedings of the Nineteenth European Conference on Computer Systems, EuroSys '24, page 674\u2013688, Athens, Greece, 2024."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1961296.1950396"},{"key":"e_1_3_2_1_25_1","first-page":"14","volume-title":"Proceedings of the the 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on The Foundations of Software Engineering, ESEC-FSE '07","author":"Christodorescu M.","year":"2007","unstructured":"M. Christodorescu, S. Jha, and C. Kruegel. Mining specifications of malicious behavior. In Proceedings of the the 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on The Foundations of Software Engineering, ESEC-FSE '07, page 5\u201314, Dubrovnik, Croatia, 2007."},{"key":"e_1_3_2_1_26_1","first-page":"290","volume-title":"Proceedings of the 30th International Conference on Software Engineering, ICSE '08","author":"Csallner C.","year":"2008","unstructured":"C. Csallner, N. Tillmann, and Y. Smaragdakis. Dysy: dynamic symbolic execution for invariant inference. In Proceedings of the 30th International Conference on Software Engineering, ICSE '08, page 281\u2013290, Leipzig, Germany, 2008."},{"key":"e_1_3_2_1_27_1","first-page":"126","volume-title":"19th USENIX Conference on File and Storage Technologies (FAST 21)","author":"Domingo D.","unstructured":"D. Domingo and S. Kannan. pFSCK: Accelerating file system checking and repair for modern storage. In 19th USENIX Conference on File and Storage Technologies (FAST 21), pages 113\u2013126. USENIX Association, Feb. 2021."},{"key":"e_1_3_2_1_28_1","first-page":"360","volume-title":"Proceedings of the 29th ACM\/IEEE International Conference on Automated Software Engineering, ASE '14","author":"Felsing D.","year":"2014","unstructured":"D. Felsing, S. Grebing, V. Klebanov, P. R\u00fcmmer, and M. Ulbrich. Automating regression verification. In Proceedings of the 29th ACM\/IEEE International Conference on Automated Software Engineering, ASE '14, page 349\u2013360, Vasteras, Sweden, 2014."},{"key":"e_1_3_2_1_29_1","first-page":"2846","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Fioraldi A.","unstructured":"A. Fioraldi, D. C. D'Elia, and D. Balzarotti. The use of likely invariants as feedback for fuzzers. In 30th USENIX Security Symposium (USENIX Security 21), pages 2829\u20132846. USENIX Association, Aug. 2021."},{"key":"e_1_3_2_1_30_1","first-page":"343","volume-title":"Proceedings of the Twelfth European Conference on Computer Systems, EuroSys '17","author":"Fonseca P.","year":"2017","unstructured":"P. Fonseca, K. Zhang, X. Wang, and A. Krishnamurthy. An empirical study on the correctness of formally verified distributed systems. In Proceedings of the Twelfth European Conference on Computer Systems, EuroSys '17, page 328\u2013343, Belgrade, Serbia, 2017."},{"key":"e_1_3_2_1_31_1","first-page":"115","volume-title":"Proceedings of the ACM SIGOPS 28th Symposium on Operating Systems Principles, SOSP '21","author":"Fu X.","year":"2021","unstructured":"X. Fu, W.-H. Kim, A. P. Shreepathi, M. Ismail, S. Wadkar, D. Lee, and C. Min. Witcher: Systematic crash consistency testing for non-volatile memory key-value stores. In Proceedings of the ACM SIGOPS 28th Symposium on Operating Systems Principles, SOSP '21, page 100\u2013115, Virtual Event, Germany, 2021."},{"key":"e_1_3_2_1_32_1","first-page":"51","volume-title":"Proceedings of the 29th Symposium on Operating Systems Principles, SOSP '23","author":"Gong S.","year":"2023","unstructured":"S. Gong, D. Peng, D. Alt\u0131nb\u00fcken, P. Fonseca, and P. Maniatis. Snowcat: Efficient kernel concurrency testing using a learned coverage predictor. In Proceedings of the 29th Symposium on Operating Systems Principles, SOSP '23, page 35\u201351, Koblenz, Germany, 2023."},{"key":"e_1_3_2_1_33_1","first-page":"12","volume-title":"Proceedings of the 45th International Conference on Software Engineering: Software Engineering in Practice, ICSE-SEIP '23","author":"Hackett F.","year":"2023","unstructured":"F. Hackett, J. Rowe, and M. A. Kuppe. Understanding inconsistency in azure cosmos db with tla+. In Proceedings of the 45th International Conference on Software Engineering: Software Engineering in Practice, ICSE-SEIP '23, page 1\u201312, Melbourne, Australia, 2023."},{"key":"e_1_3_2_1_34_1","first-page":"115","volume-title":"14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20)","author":"Hance T.","unstructured":"T. Hance, A. Lattuada, C. Hawblitzel, J. Howell, R. Johnson, and B. Parno. Storage systems are distributed systems (so verify them that Way!). In 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20), pages 99\u2013115. USENIX Association, Nov. 2020."},{"key":"e_1_3_2_1_35_1","first-page":"301","volume-title":"Proceedings of the 24th International Conference on Software Engineering, ICSE '02","author":"Hangal S.","year":"2002","unstructured":"S. Hangal and M. S. Lam. Tracking down software bugs using automatic anomaly detection. In Proceedings of the 24th International Conference on Software Engineering, ICSE '02, page 291\u2013301, Orlando, Florida, 2002."},{"key":"e_1_3_2_1_36_1","first-page":"17","volume-title":"Proceedings of the 25th Symposium on Operating Systems Principles, SOSP '15","author":"Hawblitzel C.","year":"2015","unstructured":"C. Hawblitzel, J. Howell, M. Kapritsos, J. R. Lorch, B. Parno, M. L. Roberts, S. Setty, and B. Zill. Ironfleet: proving practical distributed systems correct. In Proceedings of the 25th Symposium on Operating Systems Principles, SOSP '15, page 1\u201317, Monterey, California, 2015."},{"key":"e_1_3_2_1_37_1","volume-title":"Proc. ACM Manag. Data, 2(1), mar","author":"Hu G.","year":"2024","unstructured":"G. Hu, Z. Wang, C. Tang, J. Shen, Z. Dong, S. Yao, and H. Chen. Webridge: Synthesizing stored procedures for large-scale real-world web applications. Proc. ACM Manag. Data, 2(1), mar 2024."},{"key":"e_1_3_2_1_38_1","volume-title":"Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation, OSDI '20. USENIX","author":"Hu Y.","year":"2020","unstructured":"Y. Hu, G. Huang, and P. Huang. Automated reasoning and detection of specious configuration in large systems with symbolic execution. In Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation, OSDI '20. USENIX, November 2020."},{"key":"e_1_3_2_1_39_1","first-page":"220","volume-title":"Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles, SOSP '09","author":"Klein G.","year":"2009","unstructured":"G. Klein, K. Elphinstone, G. Heiser, J. Andronick, D. Cock, P. Derrin, D. Elkaduwe, K. Engelhardt, R. Kolanski, M. Norrish, T. Sewell, H. Tuch, and S. Winwood. sel4: formal verification of an os kernel. In Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles, SOSP '09, page 207\u2013220, Big Sky, Montana, USA, 2009."},{"key":"e_1_3_2_1_40_1","first-page":"454","volume-title":"Proceedings of the ACM SIGOPS 30th Symposium on Operating Systems Principles, SOSP '24","author":"Lattuada A.","year":"2024","unstructured":"A. Lattuada, T. Hance, J. Bosamiya, M. Brun, C. Cho, H. LeBlanc, P. Srinivasan, R. Achermann, T. Chajed, C. Hawblitzel, J. Howell, J. R. Lorch, O. Padon, and B. Parno. Verus: A practical foundation for systems verification. In Proceedings of the ACM SIGOPS 30th Symposium on Operating Systems Principles, SOSP '24, page 438\u2013454, Austin, TX, USA, 2024."},{"key":"e_1_3_2_1_41_1","first-page":"600","volume-title":"Proceedings of the 33rd International Conference on Software Engineering, ICSE '11","author":"Lee C.","year":"2011","unstructured":"C. Lee, F. Chen, and G. Ro\u015fu. Mining parametric specifications. In Proceedings of the 33rd International Conference on Software Engineering, ICSE '11, page 591\u2013600, Waikiki, Honolulu, HI, USA, 2011."},{"key":"e_1_3_2_1_42_1","first-page":"2062","volume-title":"21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24)","author":"Li A.","year":"2024","unstructured":"A. Li, S. Lu, S. Nath, R. Padhye, and V. Sekar. {ExChain}: Exception dependency analysis for root cause diagnosis. In 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24), pages 2047\u20132062, 2024."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428218"},{"key":"e_1_3_2_1_44_1","first-page":"107","volume-title":"16th USENIX Symposium on Operating Systems Design and Implementation, OSDI '22","author":"Lou C.","year":"2022","unstructured":"C. Lou, Y. Jing, and P. Huang. Demystifying and checking silent semantic violations in large distributed systems. In 16th USENIX Symposium on Operating Systems Design and Implementation, OSDI '22, pages 91\u2013107, July 2022."},{"key":"e_1_3_2_1_45_1","first-page":"543","volume-title":"2024 USENIX Annual Technical Conference (USENIX ATC 24)","author":"Lyu T.","unstructured":"T. Lyu, L. Zhang, Z. Feng, Y. Pan, Y. Ren, M. Xu, M. Payer, and S. Kashyap. Monarch: A fuzzing framework for distributed file systems. In 2024 USENIX Annual Technical Conference (USENIX ATC 24), pages 529\u2013543. USENIX Association, July 2024."},{"key":"e_1_3_2_1_46_1","first-page":"251","volume-title":"Proceedings of the 12th ACM SIGSOFT Twelfth International Symposium on Foundations of Software Engineering, SIGSOFT '04\/FSE-12","author":"Orso A.","year":"2004","unstructured":"A. Orso, N. Shi, and M. J. Harrold. Scaling regression testing to large software systems. In Proceedings of the 12th ACM SIGSOFT Twelfth International Symposium on Foundations of Software Engineering, SIGSOFT '04\/FSE-12, page 241\u2013251, Newport Beach, CA, USA, 2004."},{"key":"e_1_3_2_1_47_1","first-page":"395","volume-title":"Proceedings of the Twentieth European Conference on Computer Systems, EuroSys '25","author":"Ouyang L.","year":"2025","unstructured":"L. Ouyang, X. Sun, R. Tang, Y. Huang, M. Jivrajani, X. Ma, and T. Xu. Multi-grained specifications for distributed system model checking and verification. In Proceedings of the Twentieth European Conference on Computer Systems, EuroSys '25, page 379\u2013395, Rotterdam, Netherlands, 2025."},{"key":"e_1_3_2_1_48_1","first-page":"36","volume-title":"Proceedings of the 16th Workshop on Hot Topics in Operating Systems, HotOS '17","author":"Panda A.","year":"2017","unstructured":"A. Panda, M. Sagiv, and S. Shenker. Verification in the age of microservices. In Proceedings of the 16th Workshop on Hot Topics in Operating Systems, HotOS '17, page 30\u201336, Whistler, BC, Canada, 2017."},{"key":"e_1_3_2_1_49_1","first-page":"48","volume-title":"Proceedings of the 2014 International Symposium on Software Testing and Analysis, ISSTA 2014","author":"Pastore F.","year":"2014","unstructured":"F. Pastore, L. Mariani, A. E. J. Hyv\u00e4rinen, G. Fedyukovich, N. Sharygina, S. Sehestedt, and A. Muhammad. Verification-aided regression testing. In Proceedings of the 2014 International Symposium on Software Testing and Analysis, ISSTA 2014, page 37\u201348, San Jose, CA, USA, 2014."},{"key":"e_1_3_2_1_50_1","first-page":"431","volume-title":"Companion Proceedings of the ACM on Web Conference 2025, WWW '25","author":"Pei C.","year":"2025","unstructured":"C. Pei, Z. Wang, F. Liu, Z. Li, Y. Liu, X. He, R. Kang, T. Zhang, J. Chen, J. Li, G. Xie, and D. Pei. Flow-of-action: Sop enhanced llm-based multi-agent system for root cause analysis. In Companion Proceedings of the ACM on Web Conference 2025, WWW '25, page 422\u2013431, Sydney NSW, Australia, 2025."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2854146"},{"key":"e_1_3_2_1_52_1","first-page":"219","volume-title":"Companion Proceedings of the 32nd ACM International Conference on the Foundations of Software Engineering, FSE 2024","author":"Roy D.","year":"2024","unstructured":"D. Roy, X. Zhang, R. Bhave, C. Bansal, P. Las-Casas, R. Fonseca, and S. Rajmohan. Exploring llm-based agents for root cause analysis. In Companion Proceedings of the 32nd ACM International Conference on the Foundations of Software Engineering, FSE 2024, page 208\u2013219, Porto de Galinhas, Brazil, 2024."},{"key":"e_1_3_2_1_53_1","first-page":"572","volume-title":"Proceedings of the 22nd IEEE\/ACM international conference on Automated software engineering","author":"Sen K.","year":"2007","unstructured":"K. Sen. Concolic testing. In Proceedings of the 22nd IEEE\/ACM international conference on Automated software engineering, pages 571\u2013572, 2007."},{"key":"e_1_3_2_1_54_1","first-page":"93","volume-title":"Proceedings of the 19th Workshop on Hot Topics in Operating Systems","author":"Su Y.","year":"2023","unstructured":"Y. Su, C. Wan, U. Sethi, S. Lu, M. Musuvathi, and S. Nath. Hotgpt: How to make software documentation more useful with a large language model? In Proceedings of the 19th Workshop on Hot Topics in Operating Systems, pages 87\u201393, 2023."},{"key":"e_1_3_2_1_55_1","first-page":"666","volume-title":"18th USENIX Symposium on Operating Systems Design and Implementation (OSDI 24)","author":"Sun X.","unstructured":"X. Sun, W. Ma, J. T. Gu, Z. Ma, T. Chajed, J. Howell, A. Lattuada, O. Padon, L. Suresh, A. Szekeres, and T. Xu. Anvil: Verifying liveness of cluster management controllers. In 18th USENIX Symposium on Operating Systems Design and Implementation (OSDI 24), pages 649\u2013666. USENIX Association, July 2024."},{"key":"e_1_3_2_1_56_1","first-page":"13","volume-title":"Proceedings of the 1999 Conference of the Centre for Advanced Studies on Collaborative Research, CASCON '99","author":"Vall\u00e9e-Rai R.","year":"1999","unstructured":"R. Vall\u00e9e-Rai, P. Co, E. Gagnon, L. Hendren, P. Lam, and V. Sundaresan. Soot - a java bytecode optimization framework. In Proceedings of the 1999 Conference of the Centre for Advanced Studies on Collaborative Research, CASCON '99, page 13, Mississauga, Ontario, Canada, 1999."},{"key":"e_1_3_2_1_57_1","first-page":"147","volume-title":"Proceedings of the 5th Workshop on Machine Learning and Systems, EuroMLSys '25","author":"Wang Y.","year":"2025","unstructured":"Y. Wang and K. P. Birman. Diagnosing and resolving cloud platform instability with multi-modal rag llms. In Proceedings of the 5th Workshop on Machine Learning and Systems, EuroMLSys '25, page 139\u2013147, World Trade Center, Rotterdam, Netherlands, 2025."},{"key":"e_1_3_2_1_58_1","first-page":"4974","volume-title":"Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, CIKM '24","author":"Wang Z.","year":"2024","unstructured":"Z. Wang, Z. Liu, Y. Zhang, A. Zhong, J. Wang, F. Yin, L. Fan, L. Wu, and Q. Wen. Rcagent: Cloud root cause analysis by autonomous agents with tool-augmented large language models. In Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, CIKM '24, page 4966\u20134974, Boise, ID, USA, 2024."},{"key":"e_1_3_2_1_59_1","first-page":"68","volume-title":"Proceedings of the 45th International Conference on Software Engineering, ICSE '23","author":"Wu M.","year":"2023","unstructured":"M. Wu, M. Lu, H. Cui, J. Chen, Y. Zhang, and L. Zhang. Jitfuzz: Coverage-guided fuzzing for jvm just-in-time compilers. In Proceedings of the 45th International Conference on Software Engineering, ICSE '23, page 56\u201368, Melbourne, Victoria, Australia, 2023."},{"key":"e_1_3_2_1_60_1","first-page":"132","volume-title":"Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles, SOSP '09","author":"Xu W.","year":"2009","unstructured":"W. Xu, L. Huang, A. Fox, D. Patterson, and M. I. Jordan. Detecting large-scale system problems by mining console logs. In Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles, SOSP '09, page 117\u2013132, Big Sky, Montana, USA, 2009."},{"key":"e_1_3_2_1_61_1","first-page":"227","volume-title":"Proceedings of the ACM SIGCOMM 2024 Conference, ACM SIGCOMM '24","author":"Xu X.","year":"2024","unstructured":"X. Xu, Y. Yuan, Z. Kincaid, A. Krishnamurthy, R. Mahajan, D. Walker, and E. Zhai. Relational network verification. In Proceedings of the ACM SIGCOMM 2024 Conference, ACM SIGCOMM '24, page 213\u2013227, Sydney, NSW, Australia, 2024."},{"key":"e_1_3_2_1_62_1","first-page":"501","volume-title":"16th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2022","author":"Yao J.","year":"2022","unstructured":"J. Yao, R. Tao, R. Gu, and J. Nieh. DuoAI: Fast, automated inference of inductive invariants for verifying distributed protocols. In M. K. Aguilera and H. Weatherspoon, editors, 16th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2022, Carlsbad, CA, USA, July 11\u201313, 2022, pages 485\u2013501. USENIX Association, 2022."},{"key":"e_1_3_2_1_63_1","first-page":"421","volume-title":"15th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2021, July 14\u201316","author":"Yao J.","year":"2021","unstructured":"J. Yao, R. Tao, R. Gu, J. Nieh, S. Jana, and G. Ryan. DistAI: Data-driven automated invariant learning for distributed protocols. In A. D. Brown and J. R. Lorch, editors, 15th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2021, July 14\u201316, 2021, pages 405\u2013421. USENIX Association, 2021."},{"key":"e_1_3_2_1_64_1","first-page":"17","volume-title":"Basilisk: Using Provenance Invariants to Automate Proofs of Undecidable Protocols","author":"Zhang T. N.","unstructured":"T. N. Zhang, K. Singh, T. Chajed, M. Kapritsos, and B. Parno. Basilisk: Using Provenance Invariants to Automate Proofs of Undecidable Protocols. pages 1\u201317."},{"key":"e_1_3_2_1_65_1","first-page":"95","volume-title":"Proceedings of the 29th Symposium on Operating Systems Principles, SOSP '23","author":"Zheng N.","year":"2023","unstructured":"N. Zheng, M. Liu, Y. Xiang, L. Song, D. Li, F. Han, N. Wang, Y. Ma, Z. Liang, D. Cai, E. Zhai, X. Liu, and X. Jin. Automated verification of an in-production dns authoritative engine. In Proceedings of the 29th Symposium on Operating Systems Principles, SOSP '23, page 80\u201395, Koblenz, Germany, 2023."},{"key":"e_1_3_2_1_66_1","first-page":"735","volume-title":"Proceedings of the Nineteenth European Conference on Computer Systems, EuroSys '24","author":"Zhong L.","year":"2024","unstructured":"L. Zhong, C. Xiang, H. Huang, B. Shen, E. Mugnier, and Y. Zhou. Effective bug detection with unused definitions. In Proceedings of the Nineteenth European Conference on Computer Systems, EuroSys '24, page 720\u2013735, Athens, Greece, 2024."}],"event":{"name":"HotNets '25: 24th ACM Workshop on Hot Topics in Networks","location":"UMD Campus College Park MD USA","acronym":"HotNets '25","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 24th ACM Workshop on Hot Topics in Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3772356.3772385","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T12:05:47Z","timestamp":1763381147000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3772356.3772385"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,17]]},"references-count":66,"alternative-id":["10.1145\/3772356.3772385","10.1145\/3772356"],"URL":"https:\/\/doi.org\/10.1145\/3772356.3772385","relation":{},"subject":[],"published":{"date-parts":[[2025,11,17]]},"assertion":[{"value":"2025-11-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}