{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T13:38:19Z","timestamp":1730295499783,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1109\/secdev.2018.00010","type":"proceedings-article","created":{"date-parts":[[2018,11,23]],"date-time":"2018-11-23T00:15:18Z","timestamp":1542932118000},"page":"11-20","source":"Crossref","is-referenced-by-count":2,"title":["BP: DECREE: A Platform for Repeatable and Reproducible Security Experiments"],"prefix":"10.1109","author":[{"given":"Lok","family":"Yan","sequence":"first","affiliation":[]},{"given":"Benjamin","family":"Price","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Zhivich","sequence":"additional","affiliation":[]},{"given":"Brian","family":"Caswell","sequence":"additional","affiliation":[]},{"given":"Christopher","family":"Eagle","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Frantzen","sequence":"additional","affiliation":[]},{"given":"Holt","family":"Sorenson","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Thompson","sequence":"additional","affiliation":[]},{"given":"Timothy","family":"Vidas","sequence":"additional","affiliation":[]},{"given":"Jason","family":"Wright","sequence":"additional","affiliation":[]},{"given":"Vernon","family":"Rivet","sequence":"additional","affiliation":[]},{"given":"Samuel Colt","family":"VanWinkle","sequence":"additional","affiliation":[]},{"given":"Clark","family":"Wood","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","article-title":"Operating system doppelgangers: The creation of indistinguishable and deterministic environments","volume":"12","author":"wright","year":"2018","journal-title":"BSD Magazine"},{"key":"ref31","article-title":"Where am i? operating system and virtualization identification without system calls","author":"wright","year":"2017","journal-title":"Proc of the Cyber Security Symposium"},{"key":"ref30","article-title":"To-wards optimization-safe systems: Analyzing the impact of undefined behavior","author":"wang","year":"2013","journal-title":"Proc of SOSP"},{"key":"ref10","article-title":"Re-peatable reverse engineering for greater good with panda","author":"dolan-gavitt","year":"2014","journal-title":"Technical Report CUCS-023–14"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1348713.1348716"},{"key":"ref12","article-title":"Traps and pitfalls: Practical problems in system call interposition based security tools","author":"garfinkel","year":"2003","journal-title":"Proc of NDSS"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23089"},{"journal-title":"The Amazing VM Record\/Replay Feature in VMware Workstation 6","year":"0","author":"herrod","key":"ref14"},{"journal-title":"Artifact evaluation for software conferences","year":"0","author":"krishnamurthi","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1811039.1811057"},{"journal-title":"Last Stage of Delirium","article-title":"Technical analysis of the remote sendmail vulnerability","year":"2003","key":"ref17"},{"journal-title":"X86 Opcode and Instruction Reference","year":"0","author":"lejska","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"ref28","article-title":"A study of modern linux api usage and compatibility: What to support when you're supporting","author":"tsai","year":"2016","journal-title":"Proc of EuroSys"},{"journal-title":"Your Tool Works Better Than Mine? Prove It","year":"0","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1993744.1993757"},{"journal-title":"Roaming through the openssh client Cve-2016-0777 and cve-2016-0778","year":"0","key":"ref3"},{"key":"ref6","article-title":"Decoupling dynamic program analysis from execution in virtual environments","author":"chow","year":"2008","journal-title":"USENIX ATC"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2576195.2576216"},{"key":"ref5","article-title":"Analyzing a decade of linux system calls","author":"bagherzadeh","year":"2017","journal-title":"Empirical Software Engineering"},{"key":"ref8","article-title":"The design and construction of software systems","author":"dennis","year":"1972","journal-title":"Software Engineering An Advanced Course Reprint of the First Edition"},{"key":"ref7","article-title":"Repeatability and benefaction in computer systems research - a study and a modest proposal","author":"collberg","year":"2015","journal-title":"Technical Report TR-14–88"},{"journal-title":"Intel 64 and IA-32 Architectures Software Developer's Manual Combined Volues 1 2A 2B 2C 3A 3B 3C and 3D","year":"2015","key":"ref2"},{"key":"ref9","article-title":"Eidetic systems","author":"devecsery","year":"2014","journal-title":"Proc of OSDI"},{"journal-title":"CVE-2002-1337","year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2150976.2151012"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508275"},{"journal-title":"Metasploitable 2 exploitability guide","year":"2013","author":"moore","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2011.20"},{"journal-title":"Oracle Solaris Studio 12 4 Numerical Computation Guide","first-page":"155","year":"2015","key":"ref23"},{"key":"ref26","article-title":"Driller: Augmenting fuzzing through selective symbolic execution","author":"stephens","year":"2016","journal-title":"Proc of NDSS"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"}],"event":{"name":"2018 IEEE Cybersecurity Development (SecDev)","start":{"date-parts":[[2018,9,30]]},"location":"Cambridge, MA","end":{"date-parts":[[2018,10,2]]}},"container-title":["2018 IEEE Cybersecurity Development (SecDev)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8526271\/8543372\/08543382.pdf?arnumber=8543382","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T03:47:30Z","timestamp":1643255250000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8543382\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/secdev.2018.00010","relation":{},"subject":[],"published":{"date-parts":[[2018,9]]}}}