“…Traditional memory checkpointing techniques rely on commodity hardware-a strategy that provides superior deployability compared to instrumentation-based strategies [10,14,39,40,53,64,65,70,76]-to incrementally copy memory pages that were modified by the running program [11,20,21,34,37,51,54,56,58,60,63]. While incremental memory checkpointing is regarded as an efficient alternative to disk-based or full memory checkpointing [52], it still incurs nontrivial memory tracing costs for every taken checkpoint, resulting in relatively infrequent checkpoints used in practice.…”