{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T08:24:09Z","timestamp":1730276649847,"version":"3.28.0"},"reference-count":49,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/issrew.2019.00075","type":"proceedings-article","created":{"date-parts":[[2020,2,14]],"date-time":"2020-02-14T07:47:56Z","timestamp":1581666476000},"page":"218-224","source":"Crossref","is-referenced-by-count":1,"title":["Towards Testing the Software Aging Behavior of Hypervisor Hypercall Interfaces"],"prefix":"10.1109","author":[{"given":"Lukas","family":"Beierlieb","sequence":"first","affiliation":[]},{"given":"Lukas","family":"Ifflander","sequence":"additional","affiliation":[]},{"given":"Aleksandar","family":"Milenkoski","sequence":"additional","affiliation":[]},{"given":"Charles F.","family":"Goncalves","sequence":"additional","affiliation":[]},{"given":"Nuno","family":"Antunes","sequence":"additional","affiliation":[]},{"given":"Samuel","family":"Kounev","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"224","article-title":"Recovery from failures due to mandelbugs in it systems","volume":"0","author":"trivedi","year":"2011","journal-title":"2013 IEEE 19th Pacific Rim International Symposium on Dependable Computing"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2013.05.010"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2017.27"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2013.6698917"},{"key":"ref31","doi-asserted-by":"crossref","DOI":"10.1109\/DSN.2010.5544284","article-title":"An empirical investigation of fault types in space mission system software","author":"grottke","year":"2010","journal-title":"Dependable Systems and Networks (DSN) 2010 Int'l Conf"},{"journal-title":"Gao - patriot missile software problem","year":"1991","author":"report","key":"ref30"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2539118"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2539121"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2012.09.003"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1147\/rd.452.0311","article-title":"Proactive management of software aging","volume":"45","author":"castelli","year":"2001","journal-title":"IBM Journal of Research and Development"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/LADC.2018.00027"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.51"},{"journal-title":"45th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)","article-title":"Challenges of assessing the hypercall interface robustness (fast abstract)","year":"2015","author":"carvalho","key":"ref29"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1995.466961"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.1994.341370"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSN.2000.857548"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1999.781031"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.1998.730886"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.16"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.1997.632800"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICSECOMPANION.2007.84"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2007.56"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.4236\/jsea.2012.54033"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/361011.361073"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2007.55"},{"key":"ref12","first-page":"129","article-title":"Analysis of the intel pentiums ability to support a secure virtual machine monitor","author":"force","year":"2000","journal-title":"Proc Usenix Security Symp Usenix Assoc"},{"key":"ref13","first-page":"17","article-title":"Understanding full virtualization, paravirtualization, and hardware assist","author":"marshall","year":"2007","journal-title":"White Paper VMware"},{"key":"ref14","first-page":"719","article-title":"Full and paravirtualization with xen: a performance comparison","volume":"4","author":"fayyad-kazan","year":"2013","journal-title":"Journal of Emerging Trends in Computing and Information Sciences"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.163"},{"key":"ref16","first-page":"423","article-title":"The turtles project: Design and implementation of nested virtualization","volume":"10","author":"ben-yehuda","year":"2010","journal-title":"OSDI"},{"key":"ref17","first-page":"922","article-title":"Benchmarking the performance of microsoft hyper-v server, vmware esxi and xen hypervisors","volume":"4","author":"fayyad-kazan","year":"2013","journal-title":"Journal of Emerging Trends in Computing and Information Sciences"},{"journal-title":"A Dive in to Hyper-V Architecture and Vulnerabilities","year":"2018","author":"joly","key":"ref18"},{"year":"1990","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/WOSAR.2010.5722098"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW.2008.5355512"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW.2018.00016"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW.2012.82"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNT.2010.49"},{"journal-title":"Work Package 6 Virtual Secure Mode","year":"2019","key":"ref7"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2014.24"},{"journal-title":"Proceedings of 9th EAI International Conference on Mobile Networks and Management (MONAMI 2018)","article-title":"Performance Assessment of Cloud Migrations from Network and Application Point of View","year":"2017","author":"iffl\u00e4nder","key":"ref9"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW.2012.97"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.1999.809313"},{"journal-title":"The 18th International Symposium on Research in Attacks Intrusions and Defenses (RAID 2015)","year":"2015","author":"milenkoski","key":"ref48"},{"key":"ref47","first-page":"541","article-title":"A survey report on software aging and rejuvenation studies in virtualized environment","volume":"5","author":"barada","year":"2014","journal-title":"International Journal of Computer Science & Engineering Technology (IJCSET)"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.15"},{"key":"ref41","article-title":"Software faults, software aging and software rejuvenation","volume":"27","author":"grottke","year":"2005","journal-title":"J Reliab Eng Ass JPN"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/44.6.473"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2012.09.002"}],"event":{"name":"2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","start":{"date-parts":[[2019,10,27]]},"location":"Berlin, Germany","end":{"date-parts":[[2019,10,30]]}},"container-title":["2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8970146\/8990183\/08990328.pdf?arnumber=8990328","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T21:54:21Z","timestamp":1658094861000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8990328\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":49,"URL":"https:\/\/doi.org\/10.1109\/issrew.2019.00075","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}