Engineering record and replay for deployability

R O'Callahan, C Jones, N Froyd, K Huey… - 2017 USENIX Annual …, 2017 - usenix.org
The ability to record and replay program executions with low overhead enables many
applications, such as reverse-execution debugging, debugging of hard-to reproduce test …

Enabling refinable {Cross-Host} attack investigation with efficient data flow tagging and tracking

Y Ji, S Lee, M Fazzini, J Allen, E Downing… - 27th USENIX Security …, 2018 - usenix.org
Investigating attacks across multiple hosts is challenging. The true dependencies between
security-sensitive files, network endpoints, or memory objects from different hosts can be …

ReplayConfusion: Detecting cache-based covert channel attacks using record and replay

M Yan, Y Shalabi, J Torrellas - 2016 49th Annual IEEE/ACM …, 2016 - ieeexplore.ieee.org
Cache-based covert channel attacks use highly-tuned shared-cache conflict misses to pass
information from a trojan to a spy process. Detecting such attacks is very challenging. State …

Sparse record and replay with controlled scheduling

C Lidbury, AF Donaldson - Proceedings of the 40th ACM SIGPLAN …, 2019 - dl.acm.org
Modern applications include many sources of nondeterminism, eg due to concurrency,
signals, and system calls that interact with the external environment. Finding and …

Micro replication

T Distler, M Eischer, L Lawniczak - 2023 53rd Annual IEEE/IFIP …, 2023 - ieeexplore.ieee.org
State-machine replication protocols represent the foundation of many fault-tolerant services.
Unfortunately, their inherent complexity makes existing implementations notoriously difficult …

Engineering record and replay for deployability: Extended technical report

R O'Callahan, C Jones, N Froyd, K Huey, A Noll… - arxiv preprint arxiv …, 2017 - arxiv.org
The ability to record and replay program executions with low overhead enables many
applications, such as reverse-execution debugging, debugging of hard-to-reproduce test …

Record-replay architecture as a general security framework

Y Shalabi, M Yan, N Honarmand… - … Symposium on High …, 2018 - ieeexplore.ieee.org
Hardware security features need to strike a careful balance between design intrusiveness
and completeness of methods. In addition, they need to be flexible, as security threats …

[PDF][PDF] Simuboost: Scalable parallelization of functional system simulation

M Rittinghaus - 2013 - d-nb.info
Gathering detailed run-time information such as memory access traces in operating system
and security research often involves functional full system simulation (FFSS). The simulator …

UTwinVM: Reliable hints on the effects of hypervisor updates on VMs in the Cloud

D Mvondo, T **ng, A Barbalace - Proceedings of the 25th International …, 2024 - dl.acm.org
We investigate the problem of getting hints on the effects of virtualization system (aka
hypervisor) updates impact on virtual machines (VMs). System administrators can be …

Mcfly: Time-travel debugging for the web

J Vilk, ED Berger, J Mickens, M Marron - arxiv preprint arxiv:1810.11865, 2018 - arxiv.org
Time-traveling debuggers offer the promise of simplifying debugging by letting developers
freely step forwards and backwards through a program's execution. However, web …