{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T09:33:01Z","timestamp":1775899981874,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":86,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T00:00:00Z","timestamp":1645488000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"ARO Small Business Technology Transfer Program","award":["W911NF-20-C-0010"],"award-info":[{"award-number":["W911NF-20-C-0010"]}]},{"name":"NSF","award":["CCF-1919044"],"award-info":[{"award-number":["CCF-1919044"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,2,28]]},"DOI":"10.1145\/3503222.3507773","type":"proceedings-article","created":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T20:49:01Z","timestamp":1645562941000},"page":"726-739","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["RSSD: defend against ransomware with hardware-isolated network-storage codesign and post-attack analysis"],"prefix":"10.1145","author":[{"given":"Benjamin","family":"Reidys","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign, USA"}]},{"given":"Peng","family":"Liu","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, USA"}]},{"given":"Jian","family":"Huang","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,2,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2021. Amazon S3 Pricing. https:\/\/aws.amazon.com\/s3\/pricing\/"},{"key":"e_1_3_2_1_2_1","unstructured":"20 Cybersecurity Statistics That Matter in 2019. 2019. https:\/\/www.appknox.com\/blog\/cybersecurity-statistics-2019"},{"key":"e_1_3_2_1_3_1","unstructured":"2021 Ransomware Attack List and Alerts. 2021. https:\/\/cloudian.com\/ransomware-attack-list-and-alerts\/"},{"key":"e_1_3_2_1_4_1","unstructured":"3 Common Ways Ransomware Attacks Happen and How to Prevent Them. 2020. https:\/\/www.provendatarecovery.com\/blog\/common-ransomware-attacks\/"},{"key":"e_1_3_2_1_5_1","unstructured":"Amazon S3 Pricing. 2020. https:\/\/aws.amazon.com\/s3\/pricing\/"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26362-5_18"},{"key":"e_1_3_2_1_7_1","unstructured":"Andy Patrizio. 2020. Western Digital Rolls Out NVMe-over-Fabric SSDs for Legacy Storage Migration. https:\/\/www.networkworld.com\/article\/3564607\/western-digital-rolls-out-nvme-over-fabric-ssds-for-legacy-storage-migration.html"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315318"},{"key":"e_1_3_2_1_9_1","unstructured":"Azure Storage Overview Pricing. 2020. https:\/\/azure.microsoft.com\/en-us\/pricing\/details\/storage\/"},{"key":"e_1_3_2_1_10_1","unstructured":"Azure Storage Redundancy. 2021. https:\/\/docs.microsoft.com\/en-us\/azure\/storage\/common\/storage-redundancy"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/511334.511342"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2018.00089"},{"key":"e_1_3_2_1_13_1","volume-title":"Rootkit-Resistant Disks. In Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS\u201908)","author":"Butler Kevin R. B.","unstructured":"Kevin R. B. Butler, Stephen McLaughlin, and Patrick D. McDaniel. 2008. Rootkit-Resistant Disks. In Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS\u201908). Alexandria, VA."},{"key":"e_1_3_2_1_14_1","volume-title":"DataShield: Configurable Data Confidentiality and Integrity. In ACM Asia Conference on Computer and Communications Security (ASIACCS\u201917)","author":"Scott","unstructured":"Scott A. Carr and Mathias Payer. 2017. DataShield: Configurable Data Confidentiality and Integrity. In ACM Asia Conference on Computer and Communications Security (ASIACCS\u201917). Abu Dhabi, UAE."},{"key":"e_1_3_2_1_15_1","unstructured":"Rich Castagna. 2014. What is cloud backup and how does it work? https:\/\/searchdatabackup.techtarget.com\/definition\/cloud-backup"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the 25th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD\u201919)","author":"Chen Li","year":"2019","unstructured":"Li Chen, Chih-Yuan Yang, Anindya Paul, and Ravi Sahita. 2019. Towards Resilient Machine Learning for Ransomware Detection. In Proceedings of the 25th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD\u201919). Anchorage, Alaska."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522724"},{"key":"e_1_3_2_1_18_1","unstructured":"IBM Comparing. 2002. Tivoli Storage Manager and VERITAS NetBackup in Real-World Environments. A summary by IBM of the whitepaper and benchmark written by Progressive Strategies."},{"key":"e_1_3_2_1_19_1","volume-title":"Ransomware-aware Filesystem. In Proc. the 32nd Annual Conference on Computer Security Applications (ACSAC\u201916)","author":"Continella Andrea","year":"2016","unstructured":"Andrea Continella, Alessandro Guagneli, Giovanni Zingaro, Giulio De Pasquale, Alessandro Barenghi, Stefano Zanero, and Federico Maggi. 2016. ShieldFS: A Self-healing, Ransomware-aware Filesystem. In Proc. the 32nd Annual Conference on Computer Security Applications (ACSAC\u201916). Los Angeles, CA."},{"key":"e_1_3_2_1_20_1","unstructured":"Data Protection in Amazon S3. 2021. https:\/\/docs.aws.amazon.com\/AmazonS3\/latest\/userguide\/DataDurability.html"},{"key":"e_1_3_2_1_21_1","unstructured":"Encryption and Security Development in Solid State Storage Devices. 2020. https:\/\/www.delkin.com\/blog\/encryption-and-security-development-in-solid-state-storage-devices-ssd\/."},{"key":"e_1_3_2_1_22_1","unstructured":"FIU Traces. 2010. http:\/\/iotta.snia.org\/traces\/390"},{"key":"e_1_3_2_1_23_1","unstructured":"Gartner Sees Enterprise SSD-HDD Revenue Crossover in 2017. 2017. https:\/\/www.theregister.co.uk\/2016\/01\/07\/gartner_enterprise_ssd_hdd_revenue_crossover_in_2017\/"},{"key":"e_1_3_2_1_24_1","volume-title":"Cloud based storage: A brief look at dropbox. Chronicles, 30, 4","author":"Gross James","year":"2013","unstructured":"James Gross. 2013. Cloud based storage: A brief look at dropbox. Chronicles, 30, 4 (2013)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508271"},{"key":"e_1_3_2_1_26_1","unstructured":"Here is the cheapest hard drive per TB right now. 2020. https:\/\/www.techradar.com\/news\/heres-the-cheapest-hard-drive-per-tb-right-now"},{"key":"e_1_3_2_1_27_1","volume-title":"Cyberattacks rank 5th in the Top 10 list of most-likely global risks","author":"Problems How Bad","year":"2021","unstructured":"How Bad is the Problems. Cyberattacks rank 5th in the Top 10 list of most-likely global risks. 2021. https:\/\/cloudian.com\/lp\/lock-ransomware-out-keep-data-safe-ent\/"},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST\u201917)","author":"Huang Jian","unstructured":"Jian Huang, Anirudh Badam, Laura Caulfield, Suman Nath, Sudipta Sengupta, Bikash Sharma, and Moinuddin K. Qureshi. 2017. FlashBlox: Achieving Performance Isolation and Uniform Lifetime for Virtualized SSDs. In Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST\u201917). Santa Clara, CA."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2749469.2750420"},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the 24th ACM Conference on Computer and Communications Security (CCS\u201917)","author":"Huang Jian","unstructured":"Jian Huang, Jun Xu, Xinyu Xing, Peng Liu, and Moinuddin K. Qureshi. 2017. FlashGuard: Leveraging Intrinsic Flash Properties to Defend Against Encryption Ransomware. In Proceedings of the 24th ACM Conference on Computer and Communications Security (CCS\u201917). Dallas, TX."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2367589.2367597"},{"key":"e_1_3_2_1_33_1","unstructured":"Intel SGX Explained. 2016. https:\/\/eprint.iacr.org\/2016\/086.pdf"},{"key":"e_1_3_2_1_34_1","unstructured":"IOzone Lab. 2016. http:\/\/www.iozone.org\/"},{"key":"e_1_3_2_1_35_1","unstructured":"Jeffrey Burt. 2019. Bringing NVMe Over Fabrics Into the Storage Big Tent . https:\/\/www.nextplatform.com\/2019\/02\/26\/bringing-nvme-over-fabrics-into-the-storage-big-tent\/"},{"key":"e_1_3_2_1_36_1","unstructured":"John Edwards. 2019. NVMe over Fabrics Creates Data-Center Storage Disruption . https:\/\/www.networkworld.com\/article\/3394296\/nvme-over-fabrics-creates-data-center-storage-disruption.html"},{"key":"e_1_3_2_1_37_1","first-page":"32","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Kharaz Amin","year":"2016","unstructured":"Amin Kharaz, Sajjad Arshad, Collin Mulliner, William Robertson, and Engin Kirda. 2016. UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware. In 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, Austin, TX. 757\u2013772. isbn:978-1-931971-32-4"},{"key":"e_1_3_2_1_38_1","volume-title":"Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks. In Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA). Milan, IT.","author":"Kharraz Amin","year":"2015","unstructured":"Amin Kharraz, William Robertson, Davide Balzarotti, Leyla Bilge, and Engin Kirda. 2015. Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks. In Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA). Milan, IT."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053035"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3123939.3124553"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3123939.3124553"},{"key":"e_1_3_2_1_43_1","volume-title":"Proceedings of the 2007 ACM Workshop on Storage Security and Survivability (StorageSS\u201907)","author":"Krishnan Swetha","unstructured":"Swetha Krishnan, Giridhar Ravipati, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, and Barton P. Miller. 2007. The Effects of Metadata Corruption on NFS. In Proceedings of the 2007 ACM Workshop on Storage Security and Survivability (StorageSS\u201907). Alexandria, VA."},{"key":"e_1_3_2_1_44_1","volume-title":"Proc. FAST\u201915","author":"Lee Changman","year":"2015","unstructured":"Changman Lee, Dongbo Sim, Joo-Young Hwang, and Sangyeun Cho. 2015. F2FS: A New File System for Flash Storage. In Proc. FAST\u201915. Santa Clara, CA."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2012.2227479"},{"key":"e_1_3_2_1_46_1","unstructured":"LibLZF. [n. d.]. http:\/\/oldhome.schmorp.de\/marc\/liblzf.html"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358320"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/RDCAPE.2017.8358312"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1534912.1534913"},{"key":"e_1_3_2_1_50_1","unstructured":"Microsoft Azure Bandwidth Pricing Details. 2021. https:\/\/azure.microsoft.com\/en-us\/pricing\/details\/bandwidth\/"},{"key":"e_1_3_2_1_51_1","unstructured":"MSR Cambridge Traces. 2010. http:\/\/iotta.snia.org\/traces\/388"},{"key":"e_1_3_2_1_52_1","unstructured":"Codrut Neagu. 2018. What is SSD TRIM why is it useful and how to check whether it is turned on. https:\/\/www.digitalcitizen.life\/simple-questions-what-trim-ssds-why-it-useful"},{"key":"e_1_3_2_1_53_1","unstructured":"NetApp. 1997. http:\/\/www.shub-internet.org\/brad\/FreeBSD\/postmark.html"},{"key":"e_1_3_2_1_54_1","unstructured":"NVM Express. [n. d.]. NVMe over Fabrics. https:\/\/nvmexpress.org\/wp-content\/uploads\/NVMe_Over_Fabrics.pdf"},{"key":"e_1_3_2_1_55_1","unstructured":"NVMe over Fabrics. 2016. https:\/\/nvmexpress.org\/wp-content\/uploads\/NVMe_Over_Fabrics.pdf"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317889"},{"key":"e_1_3_2_1_57_1","unstructured":"Power Loss Protection. 2020. https:\/\/www.atpinc.com\/blog\/how-industrial-SSDs-handles-power-loss)"},{"key":"e_1_3_2_1_58_1","volume-title":"USENIX Annual Technical Conference (USENIX ATC\u201905)","author":"Prabhakaran Vijayan","year":"2005","unstructured":"Vijayan Prabhakaran, Andrea C Arpaci-Dusseau, and Remzi H Arpaci-Dusseau. 2005. Analysis and Evolution of Journaling File Systems.. In USENIX Annual Technical Conference (USENIX ATC\u201905). 105\u2013120."},{"key":"e_1_3_2_1_59_1","volume-title":"Transactional Flash. In Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation (OSDI\u201908)","author":"Prabhakaran Vijayan","year":"2008","unstructured":"Vijayan Prabhakaran, Thomas L. Rodeheffer, and Lidong Zhou. 2008. Transactional Flash. In Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation (OSDI\u201908)."},{"key":"e_1_3_2_1_60_1","volume-title":"inexpensive backup solutions for open systems. O\u2019Reilly Media","author":"Preston Curtis","unstructured":"Curtis Preston. 2007. Backup & recovery: inexpensive backup solutions for open systems. O\u2019Reilly Media, Inc.."},{"key":"e_1_3_2_1_61_1","unstructured":"Ransomware Attack Every 14 Seconds. 2019. https:\/\/cybersecurityventures.com\/global-ransomware-damage-costs-predicted-to-reach-20-billion-usd-by-2021\/"},{"key":"e_1_3_2_1_62_1","unstructured":"Ransomware Costs. 2020. https:\/\/purplesec.us\/resources\/cyber-security-statistics\/ransomware\/#:\\~:text=The%20Cost%20Of%20Ransomware%20Attacks 2019%20%E2%80%93%20%2411.5%20billion"},{"key":"e_1_3_2_1_63_1","unstructured":"Ransomware Samples. 2021. https:\/\/github.com\/x7z9h3\/x7z9h3"},{"key":"e_1_3_2_1_64_1","volume-title":"Trends and Facts for 2021 and Beyond","author":"Statistics Ransomware","year":"2021","unstructured":"Ransomware Statistics, Trends and Facts for 2021 and Beyond. 2021. https:\/\/www.cloudwards.net\/ransomware-statistics\/"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.28"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/146941.146943"},{"key":"e_1_3_2_1_67_1","volume-title":"Microsoft Windows Internals: Microsoft Windows Server","author":"Russinovich Mark E","year":"2003","unstructured":"Mark E Russinovich, David A Solomon, and Jim Allchin. 2005. Microsoft Windows Internals: Microsoft Windows Server 2003, Windows XP, and Windows 2000. 4, Microsoft Press Redmond."},{"key":"e_1_3_2_1_68_1","unstructured":"Samsung. 2020. Samsung SSD . https:\/\/www.samsung.com\/semiconductor\/minisite\/ssd\/product\/data-center\/983dct\/"},{"key":"e_1_3_2_1_69_1","unstructured":"Samsung. 2021. Samsung NVMe SSD 983 DCT: Enhanced for Speed and Reliability. White Paper."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2016.46"},{"key":"e_1_3_2_1_72_1","unstructured":"D. Sgandurra L. Mu\u00f1oz-Gonz\u00e1lez R. Mohsen and E. C. Lupu. 2016. Automated Dynamic Analysis of Ransomware: Benefits Limitations and use for Detection. ArXiv e-prints Sept. arxiv:1609.03020."},{"key":"e_1_3_2_1_73_1","unstructured":"Shore-MT. 2014. https:\/\/sites.google.com\/view\/shore-mt\/"},{"key":"e_1_3_2_1_75_1","volume-title":"Proceedings of the 9th ACM European Conference on Computer Systems (EuroSys\u201914)","author":"Subramanian Sriram","unstructured":"Sriram Subramanian, Swaminathan Sundararaman, Nisha Talagala, Andrea C. Arpaci-Dusseau, and Remzi H. Arpaci-Dusseau. 2014. Snapshots in a Flash with ioSnap. In Proceedings of the 9th ACM European Conference on Computer Systems (EuroSys\u201914)."},{"key":"e_1_3_2_1_76_1","unstructured":"Texas Instruments. 2015. DP83867E\/IS\/CS\/IR\/CR RGZ Power Consumption Data. White Paper."},{"key":"e_1_3_2_1_77_1","unstructured":"The OpenSSD Project. 2019. http:\/\/www.openssd-project.org\/wiki\/The_OpenSSD_Project"},{"key":"e_1_3_2_1_79_1","volume-title":"Malware and URL Scanner","author":"Free Online Virus VirusTotal","year":"2016","unstructured":"VirusTotal - Free Online Virus, Malware and URL Scanner. 2016. https:\/\/www.virustotal.com\/"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3302424.3303983"},{"key":"e_1_3_2_1_81_1","volume-title":"23rd ACM Conference on Computer and Communications Security","author":"Wang Yongzhi","year":"2016","unstructured":"Yongzhi Wang and Yulong Shen. 2016. RIA-An Audition-based Method to Protect the Runtime Integrity of MapReduce Applications. In 23rd ACM Conference on Computer and Communications Security. Vienna, Austria."},{"key":"e_1_3_2_1_82_1","unstructured":"WannaCry Ransomware Attack. 2017. https:\/\/en.wikipedia.org\/wiki\/WannaCry_ransomware_attack"},{"key":"e_1_3_2_1_83_1","volume-title":"Procceedings of 9th USENIX Conference on File and Storage Technologies (FAST\u201911)","author":"Chung Wei Michael Yung","year":"2011","unstructured":"Michael Yung Chung Wei, Laura M Grupp, Frederick E Spada, and Steven Swanson. 2011. Reliably Erasing Data from Flash-Based Solid State Drives.. In Procceedings of 9th USENIX Conference on File and Storage Technologies (FAST\u201911)."},{"key":"e_1_3_2_1_84_1","unstructured":"Wikipedia. 2014. Journaling File System. https:\/\/en.wikipedia.org\/wiki\/Journaling_file_system"},{"key":"e_1_3_2_1_85_1","unstructured":"Wikipedia Ransomware. 2019. https:\/\/en.wikipedia.org\/wiki\/https:\/\/www.appknox.com\/blog\/cybersecurity-statistics-2019Ransomware"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/2168836.2168862"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.56"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.5555\/2014698.2014865"},{"key":"e_1_3_2_1_89_1","unstructured":"ZDNet. 2021. This is how long hackers will hide in your network before deploying ransomware or being spotted . https:\/\/www.zdnet.com\/article\/this-is-how-long-hackers-will-spend-in-your-network-before-deploying-ransomware-or-being-spotted\/"},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11212-1_27"},{"key":"e_1_3_2_1_91_1","volume-title":"27th USENIX Security Symposium (Security\u201918)","author":"Zhang-Kennedy Leah","year":"2018","unstructured":"Leah Zhang-Kennedy, Hala Assal, Jessica Rocheleau, Reham Mohamed, Khadija Baig, and Sonia Chiasson. 2018. The aftermath of a crypto-ransomware attack at a large academic institution. In 27th USENIX Security Symposium (Security\u201918). Baltimore, MD."}],"event":{"name":"ASPLOS '22: 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems","location":"Lausanne Switzerland","acronym":"ASPLOS '22","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3503222.3507773","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3503222.3507773","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3503222.3507773","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:49Z","timestamp":1750188649000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3503222.3507773"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,22]]},"references-count":86,"alternative-id":["10.1145\/3503222.3507773","10.1145\/3503222"],"URL":"https:\/\/doi.org\/10.1145\/3503222.3507773","relation":{},"subject":[],"published":{"date-parts":[[2022,2,22]]},"assertion":[{"value":"2022-02-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}