Zoran Skoda verified replay

See also computer security, cryptography, state channel

  • mozilla.rr github, related projects
  • Deterministic execution vs record-and-replay
  • Andreas Haeberlen, Paarijaat Aditya, Rodrigo Rodrigues, Peter Druschel, Accountable virtual machines pdf
  • github/samsara-linux-3.11
  • CRIU, a project to implement checkpoint/restore functionality for Linux, wiki: criu.org
  • H Liu, H Jin, X Liao, L Hu, C Yu, Live migration of virtual machine based on full system trace and replay, HPDC ‘09 Proceedings of the 18th ACM international symposium on high performance distributed computing 101-110 doi pdf
  • G. W. Dunlap, ReVirt: Enabling intrusion analysis through virtual-machine logging and replay, Proc. OSDI 2002, doi, pdf
  • Michael Zangl, Towards heterogeneous deterministic replay for symmetric multiprocessors, Karlsruher institut für technologie 2017, 71 pp. pdf
  • R. S. Wahby et al. Doubly-efficient zkSNARKs without trusted setup, 2018, pdf
  • VMWare record and replay 2008 html
  • U Feige, J Kilian, Making games short, STOC, 1997 pdf
  • R. Canetti , B. Riva, G. N. Rothblum, Practical delegation of computation using multiple servers, Proc. 18th ACM Conference on Computer and Communications Security, 445–454 (2011) doi; Two protocols for delegation of computation, ICITS 2012: Information Theoretic Security 37-61, Lecture Notes in Computer Science 7412, doi
  • cartesi.io cartesi_whitepaper.pdf; Erick de Moura, On Linux and blockchains, medium, Welcome to Cartesi, medium; Welcome to Cartesi yt
  • M. Xu, R. Bodik, M.D. Hill, A “flight data recorder” for enabling full-system multiprocessor deterministic replay, Proc. ISCA, 122-135 (2003) pdf old pdf
  • OpenVZ - an open source container-based virtualization for Linux; capable of live migration (even with gdb active)
  • S. Avizheh et al. Verifiable computation using smart contracts, doi
  • R. Kumaresan, Broadcast and verifiable secret sharing: new security models and round optimal constructions, PhD thesis, Univ. of Maryland 2012 abs
  • J. Lee, K. Nikitin, S. Setty, Replicated state machines without replicated execution, 2020 IEEE Symposium on Security and Privacy, doi
  • H. Seike, Y. Aoki, N. Koshizuka, Towards smart contracts for verifying DNN model generation process with the blockchain, 2021 IEEE 6th International Conference on Big Data Analytics (ICBDA) doi

QEMU

  • QEMU, Open source processor emulator, www.qemu.org, wiki/record-replay
  • Pavel Dovgalyuk, Deterministic replay of system’s execution with multi-target QEMU simulator for dynamic analysis and reverse debugging, CSMR 2012:1, 553-556, doi
  • P. Dovgalyuk, D. Dmitriev, V. Makarov (2015), Don’t panic: reverse debugging of kernel drivers, Proc. 10th Joint Meeting on Foundations of Software Engineering - ESEC/FSE 2015 doi

Verified & accountable computation

  • B. Parno, J. Howell, C. Gentry, M. Raykova, Pinocchio: nearly practical verifiable computation, in: Security and Privacy (SP), 2013 IEEE Symposium on. 238–252. IEEE (2013) iacr preprint pdf
  • Jérémie Decouchant et al. PAG: private and accountable gossip, 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS); preprint pdf
  • Ranjit Kumaresan (Microsoft) Amortizing cecure computation with penalties ACM CCS 2016 pdf
  • KVM deterministic replay pdf
  • Michael Walfish, Andrew J. Blumberg, Verifying computations without reexecuting them, Commun. ACM 58(2):74–84, 2015, doi

Execution enclaves and verifiable hardware

  • Pramod Subramanyan, Rohit Sinha, Ilia Lebedev, Srinivas Devadas, Sanjit A. Seshia, A formal foundation for secure remote execution enclaves, eprint.iacr.org/2017/565.pdf
  • Enclave programming model intel
  • POSTER: Rust SGX SDK: Towards Memory Safety in Intel SGX Enclave doi
  • see also for related attacks at computer security
  • R. S. Wahby et al. Verifiable ASICs, IEEE Symposium on Security and Privacy Oakland 2016, pdf

Last revised on January 4, 2022 at 00:48:04. See the history of this page for a list of all contributions to it.