CRIU, a project to implement checkpoint/restore functionality for Linux, wiki: criu.org
H Liu, H Jin, X Liao, L Hu, C Yu, Live migration of virtual machine based on full system trace and replay, HPDC ‘09 Proceedings of the 18th ACM international symposium on high performance distributed computing 101-110 doipdf
G. W. Dunlap, ReVirt: Enabling intrusion analysis through virtual-machine logging and replay, Proc. OSDI 2002, doi, pdf
Michael Zangl, Towards heterogeneous deterministic replay for symmetric multiprocessors, Karlsruher institut für technologie 2017, 71 pp. pdf
R. S. Wahby et al. Doubly-efficient zkSNARKs without trusted setup, 2018, pdf
U Feige, J Kilian, Making games short, STOC, 1997 pdf
R. Canetti , B. Riva, G. N. Rothblum, Practical delegation of computation using multiple servers, Proc. 18th ACM Conference on Computer and Communications Security, 445–454 (2011) doi; Two protocols for delegation of computation, ICITS 2012: Information Theoretic Security 37-61, Lecture Notes in Computer Science 7412, doi
M. Xu, R. Bodik, M.D. Hill, A “flight data recorder” for enabling full-system multiprocessor deterministic replay, Proc. ISCA, 122-135 (2003) pdfold pdf
OpenVZ - an open source container-based virtualization for Linux; capable of live migration (even with gdb active)
S. Avizheh et al. Verifiable computation using smart contracts, doi
R. Kumaresan, Broadcast and verifiable secret sharing: new security models and round optimal constructions, PhD thesis, Univ. of Maryland 2012 abs
J. Lee, K. Nikitin, S. Setty, Replicated state machines without replicated execution, 2020 IEEE Symposium on Security and Privacy, doi
H. Seike, Y. Aoki, N. Koshizuka, Towards smart contracts for verifying DNN model generation process with the blockchain, 2021 IEEE 6th International Conference on Big Data Analytics (ICBDA) doi
Pavel Dovgalyuk, Deterministic replay of system’s execution with multi-target QEMU simulator for dynamic analysis and reverse debugging, CSMR 2012:1, 553-556, doi
P. Dovgalyuk, D. Dmitriev, V. Makarov (2015), Don’t panic: reverse debugging of kernel drivers, Proc. 10th Joint Meeting on Foundations of Software Engineering - ESEC/FSE 2015 doi
Verified & accountable computation
B. Parno, J. Howell, C. Gentry, M. Raykova, Pinocchio: nearly practical verifiable computation, in: Security and Privacy (SP), 2013 IEEE Symposium on. 238–252. IEEE (2013) iacr preprint pdf
Jérémie Decouchant et al. PAG: private and accountable gossip, 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS); preprint pdf
Ranjit Kumaresan (Microsoft) Amortizing cecure computation with penalties ACM CCS 2016 pdf
Michael Walfish, Andrew J. Blumberg, Verifying computations without reexecuting them, Commun. ACM 58(2):74–84, 2015, doi
Execution enclaves and verifiable hardware
Pramod Subramanyan, Rohit Sinha, Ilia Lebedev, Srinivas Devadas, Sanjit A. Seshia, A formal foundation for secure remote execution enclaves, eprint.iacr.org/2017/565.pdf