[PDF][PDF] High Accuracy Attack Provenance via Binary-based Execution Partition.

KH Lee, X Zhang, D Xu - NDSS, 2013 - ndss-symposium.org
An important aspect of cyber attack forensics is to understand the provenance of suspicious
events, as it discloses the root cause and ramifications of cyber attacks. Traditionally, this is …

Troubleshooting blackbox SDN control software with minimal causal sequences

C Scott, A Wundsam, B Raghavan, A Panda… - Proceedings of the …, 2014 - dl.acm.org
Software bugs are inevitable in software-defined networking control software, and
troubleshooting is a tedious, time-consuming task. In this paper we discuss how to improve …

Minimizing faulty executions of distributed systems

C Scott, V Brajkovic, G Necula… - … USENIX Symposium on …, 2016 - usenix.org
When troubleshooting buggy executions of distributed systems, developers typically start by
manually separating out events that are responsible for triggering the bug (signal) from …

Drdebug: Deterministic replay based cyclic debugging with dynamic slicing

Y Wang, H Patil, C Pereira, G Lueck, R Gupta… - Proceedings of annual …, 2014 - dl.acm.org
We present a collection of tools, DrDebug, that greatly advances the state-of-the-art of cyclic,
interactive debugging of multi-threaded programs based upon the record and replay …

Chronicler: Lightweight recording to reproduce field failures

J Bell, N Sarda, G Kaiser - 2013 35th International Conference …, 2013 - ieeexplore.ieee.org
When programs fail in the field, developers are often left with limited information to diagnose
the failure. Automated error reporting tools can assist in bug report generation but without …

Lean: Simplifying concurrency bug reproduction via replay-supported execution reduction

J Huang, C Zhang - Proceedings of the ACM international conference on …, 2012 - dl.acm.org
Debugging concurrent programs is known to be difficult due to scheduling non-determinism.
The technique of multiprocessor deterministic replay substantially assists debugging by …

CARE: Cache guided deterministic replay for concurrent Java programs

Y Jiang, T Gu, C Xu, X Ma, J Lu - … of the 36th International Conference on …, 2014 - dl.acm.org
Deterministic replay tools help programmers debug concurrent programs. However, for long-
running programs, a replay tool may generate huge log of shared memory access …

C2sr: Cybercrime scene reconstruction for post-mortem forensic analysis

Y Kwon, W Wang, J Jung, KH Lee… - Network and Distributed …, 2021 - par.nsf.gov
Cybercrime scene reconstruction that aims to reconstruct a previous execution of the cyber
attack delivery process is an important capability for cyber forensics (eg, post mortem …

Lock trace reduction for multithreaded programs

Y Cai, WK Chan - IEEE Transactions on Parallel and …, 2013 - ieeexplore.ieee.org
Many happened-before-based detectors for debugging multithreaded programs implement
vector clocks to incrementally track the casual relations among synchronization events …

Guided algebraic specification mining for failure simplification

A Elyasov, ISWB Prasetya, J Hage - … Software and Systems: 25th IFIP WG …, 2013 - Springer
Software systems often produce logs that capture information about their execution
behaviour. When an error occurs, the log file with the error is reported for subsequent …