{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,23]],"date-time":"2025-11-23T20:56:53Z","timestamp":1763931413774,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,15]],"date-time":"2019-11-15T00:00:00Z","timestamp":1573776000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,15]]},"DOI":"10.1145\/3338511.3357350","type":"proceedings-article","created":{"date-parts":[[2019,11,8]],"date-time":"2019-11-08T13:40:33Z","timestamp":1573220433000},"page":"35-45","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Secure Zero-Day Detection"],"prefix":"10.1145","author":[{"given":"Mingyi","family":"Zhao","sequence":"first","affiliation":[{"name":"Snap Inc., Los Angeles, CA, USA"}]},{"given":"Moti","family":"Yung","sequence":"additional","affiliation":[{"name":"Google LLC and Columbia University, New York City, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,11,15]]},"reference":[{"volume-title":"Thousands of Nights: The Life and Times of Zero-Day Vulnerabilities and Their Exploits","author":"Ablon Lillian","key":"e_1_3_2_1_1_1","unstructured":"Lillian Ablon and Andy Bogart . 2017. Zero Days , Thousands of Nights: The Life and Times of Zero-Day Vulnerabilities and Their Exploits . Rand Corporation . Lillian Ablon and Andy Bogart. 2017. Zero Days, Thousands of Nights: The Life and Times of Zero-Day Vulnerabilities and Their Exploits. Rand Corporation."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/2590628.2590630"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382284"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96884-1_25"},{"key":"e_1_3_2_1_5_1","unstructured":"Gwern Branwen. 2011. TIME-LOCK ENCRYPTION. https:\/\/www.gwern.net\/Self-decrypting-files.  Gwern Branwen. 2011. TIME-LOCK ENCRYPTION. https:\/\/www.gwern.net\/Self-decrypting-files."},{"key":"e_1_3_2_1_6_1","unstructured":"Richard Clarke and Peter Swire. 2014. The NSA Shouldn't Stockpile Web Glitches. Daily Beast http:\/\/thebea.st\/2EK5szK.  Richard Clarke and Peter Swire. 2014. The NSA Shouldn't Stockpile Web Glitches. Daily Beast http:\/\/thebea.st\/2EK5szK."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660361"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2013.73"},{"key":"e_1_3_2_1_10_1","unstructured":"Andy Greenberg. 2017. The Shadow Brokers Mess Is What Happens When the NSA Hoards Zero-Days. Wired http:\/\/bit.ly\/2b5H6Dt.  Andy Greenberg. 2017. The Shadow Brokers Mess Is What Happens When the NSA Hoards Zero-Days. Wired http:\/\/bit.ly\/2b5H6Dt."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17373-8_12"},{"key":"e_1_3_2_1_12_1","series-title":"Belfer Cyber Security Project White Paper Series","volume-title":"Taking stock: Estimating vulnerability rediscovery","author":"Herr Trey","unstructured":"Trey Herr , Bruce Schneier , and Christopher Morris . 2017. Taking stock: Estimating vulnerability rediscovery . Belfer Cyber Security Project White Paper Series . Trey Herr, Bruce Schneier, and Christopher Morris. 2017. Taking stock: Estimating vulnerability rediscovery. Belfer Cyber Security Project White Paper Series."},{"key":"e_1_3_2_1_13_1","first-page":"478","article-title":"How to Build Time-Lock Encryption","volume":"2015","author":"Jager Tibor","year":"2015","unstructured":"Tibor Jager . 2015 . How to Build Time-Lock Encryption . IACR Cryptology ePrint Archive , Vol. 2015 (2015), 478 . Tibor Jager. 2015. How to Build Time-Lock Encryption. IACR Cryptology ePrint Archive, Vol. 2015 (2015), 478.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the AusCERT Asia Pacific Information Technology Security Conference","author":"Kruegel C","year":"2005","unstructured":"C Kruegel , D Mutz , W Robertson , G Vigna , and R Kemmerer . 2005 . Reverse engineering of network signatures . In Proceedings of the AusCERT Asia Pacific Information Technology Security Conference , Gold Coast, Australia. C Kruegel, D Mutz, W Robertson, G Vigna, and R Kemmerer. 2005. Reverse engineering of network signatures. In Proceedings of the AusCERT Asia Pacific Information Technology Security Conference, Gold Coast, Australia."},{"key":"e_1_3_2_1_15_1","unstructured":"Rick Ledgett. 2017. No the U.S. Government Should Not Disclose All Vulnerabilities in Its Possession. Lawfare http:\/\/bit.ly\/2mB1WQN.  Rick Ledgett. 2017. No the U.S. Government Should Not Disclose All Vulnerabilities in Its Possession. Lawfare http:\/\/bit.ly\/2mB1WQN."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45537-X_27"},{"key":"e_1_3_2_1_18_1","volume-title":"Haetae: Scaling the Performance of Network Intrusion Detection with Many-Core Processors. In International Workshop on Recent Advances in Intrusion Detection. Springer, 89--110","author":"Nam Jaehyun","year":"2015","unstructured":"Jaehyun Nam , Muhammad Jamshed , Byungkwon Choi , Dongsu Han , and KyoungSoo Park . 2015 . Haetae: Scaling the Performance of Network Intrusion Detection with Many-Core Processors. In International Workshop on Recent Advances in Intrusion Detection. Springer, 89--110 . Jaehyun Nam, Muhammad Jamshed, Byungkwon Choi, Dongsu Han, and KyoungSoo Park. 2015. Haetae: Scaling the Performance of Network Intrusion Detection with Many-Core Processors. In International Workshop on Recent Advances in Intrusion Detection. Springer, 89--110."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11379-1_21"},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of Black Hat USA","author":"Ormandy Tavis","year":"2011","unstructured":"Tavis Ormandy . 2011 . Sophail: A critical analysis of sophos antivirus . Proceedings of Black Hat USA (2011). Tavis Ormandy. 2011. Sophail: A critical analysis of sophos antivirus. Proceedings of Black Hat USA (2011)."},{"key":"e_1_3_2_1_21_1","volume-title":"The Likelihood of Vulnerability Rediscovery and the Social Utility of Vulnerability Hunting. In Workshop on the Econ. of Information Security.","author":"Ozment Andy","year":"2005","unstructured":"Andy Ozment . 2005 . The Likelihood of Vulnerability Rediscovery and the Social Utility of Vulnerability Hunting. In Workshop on the Econ. of Information Security. Andy Ozment. 2005. The Likelihood of Vulnerability Rediscovery and the Social Utility of Vulnerability Hunting. In Workshop on the Econ. of Information Security."},{"key":"e_1_3_2_1_22_1","volume-title":"International Workshop on Recent Advances in Intrusion Detection. Springer, 144--163","author":"Zubair Rafique M","year":"2013","unstructured":"M Zubair Rafique and Juan Caballero . 2013 . Firma: Malware clustering and network signature generation with mixed network behaviors . In International Workshop on Recent Advances in Intrusion Detection. Springer, 144--163 . M Zubair Rafique and Juan Caballero. 2013. Firma: Malware clustering and network signature generation with mixed network behaviors. In International Workshop on Recent Advances in Intrusion Detection. Springer, 144--163."},{"key":"e_1_3_2_1_23_1","unstructured":"Daniel relax Oberhaus. 2017. A Programmer Solved a 20-Year-Old Forgotten Crypto Puzzle. Wired https:\/\/bit.ly\/2PCRQgm.  Daniel relax Oberhaus. 2017. A Programmer Solved a 20-Year-Old Forgotten Crypto Puzzle. Wired https:\/\/bit.ly\/2PCRQgm."},{"key":"e_1_3_2_1_24_1","unstructured":"relax The Electronic Frontier Foundation. 2016. Vulnerabilities Equities Process (VEP). http:\/\/bit.ly\/2ra8WtB.  relax The Electronic Frontier Foundation. 2016. Vulnerabilities Equities Process (VEP). http:\/\/bit.ly\/2ra8WtB."},{"key":"e_1_3_2_1_25_1","unstructured":"relax The FBI Cyber Division. 2014. Snort Signatures for Mitigation Against Open Secure Socket Layer Heartbleed Extension Vulnerability. http:\/\/bit.ly\/2EPEerG.  relax The FBI Cyber Division. 2014. Snort Signatures for Mitigation Against Open Secure Socket Layer Heartbleed Extension Vulnerability. http:\/\/bit.ly\/2EPEerG."},{"key":"e_1_3_2_1_26_1","unstructured":"relax The United States Government. 2017. Vulnerabilities Equities Policy and Process for the United States Government. http:\/\/bit.ly\/2z3rkHT.  relax The United States Government. 2017. Vulnerabilities Equities Policy and Process for the United States Government. http:\/\/bit.ly\/2z3rkHT."},{"key":"e_1_3_2_1_28_1","first-page":"229","article-title":"Snort: Lightweight intrusion detection for networks","volume":"99","author":"Martin Roesch","year":"1999","unstructured":"Martin Roesch et almbox. 1999 . Snort: Lightweight intrusion detection for networks .. In Lisa , Vol. 99. 229 -- 238 . Martin Roesch et almbox. 1999. Snort: Lightweight intrusion detection for networks.. In Lisa, Vol. 99. 229--238.","journal-title":"Lisa"},{"key":"e_1_3_2_1_29_1","unstructured":"Bruce Schneier. 2015. Hacking Team Computer Vulnerabilities and the NSA. http:\/\/bit.ly\/2D9LFJP.  Bruce Schneier. 2015. Hacking Team Computer Vulnerabilities and the NSA. http:\/\/bit.ly\/2D9LFJP."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.10"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787502"},{"key":"e_1_3_2_1_32_1","volume-title":"USENIX Security Symposium. 65--80","author":"Wang Ruowen","year":"2013","unstructured":"Ruowen Wang , Peng Ning , Tao Xie , and Quan Chen . 2013 . MetaSymploit: Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis .. In USENIX Security Symposium. 65--80 . Ruowen Wang, Peng Ning, Tao Xie, and Quan Chen. 2013. MetaSymploit: Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis.. In USENIX Security Symposium. 65--80."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053002"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524526"}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"London United Kingdom","acronym":"CCS '19"},"container-title":["Proceedings of the 1st ACM Workshop on Workshop on Cyber-Security Arms Race"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338511.3357350","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3338511.3357350","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:46Z","timestamp":1750203886000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338511.3357350"}},"subtitle":["Wiping Off the VEP Trade-Off"],"short-title":[],"issued":{"date-parts":[[2019,11,15]]},"references-count":31,"alternative-id":["10.1145\/3338511.3357350","10.1145\/3338511"],"URL":"https:\/\/doi.org\/10.1145\/3338511.3357350","relation":{},"subject":[],"published":{"date-parts":[[2019,11,15]]},"assertion":[{"value":"2019-11-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}