{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:12:26Z","timestamp":1750219946170,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":80,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF1910049"],"award-info":[{"award-number":["W911NF1910049"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS-1815650, CNS-2054657"],"award-info":[{"award-number":["CNS-1815650, CNS-2054657"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3548606.3560647","type":"proceedings-article","created":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T11:41:28Z","timestamp":1667821288000},"page":"1993-2007","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Ready Raider One"],"prefix":"10.1145","author":[{"given":"Guannan","family":"Liu","sequence":"first","affiliation":[{"name":"Virginia Tech, Arlington, VA, USA"}]},{"given":"Daiping","family":"Liu","sequence":"additional","affiliation":[{"name":"Palo Alto Networks, Inc., Santa Clara, CA, USA"}]},{"given":"Shuai","family":"Hao","sequence":"additional","affiliation":[{"name":"Old Dominion University, Norfolk, VA, USA"}]},{"given":"Xing","family":"Gao","sequence":"additional","affiliation":[{"name":"University of Delaware, Newark, DE, USA"}]},{"given":"Kun","family":"Sun","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]},{"given":"Haining","family":"Wang","sequence":"additional","affiliation":[{"name":"Virginia Tech, Arlington, VA, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,11,7]]},"reference":[{"unstructured":"2018. Valve removes Steam game after allegations of hidden cryptocurrency miner. https:\/\/arstechnica.com\/gaming\/2018\/07\/valve-removes-steam-gameafter-allegations-of-hidden-cryptocurrency-miner\/.  2018. Valve removes Steam game after allegations of hidden cryptocurrency miner. https:\/\/arstechnica.com\/gaming\/2018\/07\/valve-removes-steam-gameafter-allegations-of-hidden-cryptocurrency-miner\/.","key":"e_1_3_2_1_1_1"},{"unstructured":"2020. COVID-19 Has Increased Interest in Cloud Gaming Services. https:\/\/www.pcmag.com\/news\/covid-19-has-increased-interest-in-cloudgaming-services.  2020. COVID-19 Has Increased Interest in Cloud Gaming Services. https:\/\/www.pcmag.com\/news\/covid-19-has-increased-interest-in-cloudgaming-services.","key":"e_1_3_2_1_2_1"},{"unstructured":"2020. Report: Gaming Industry Value To Rise 30%. https:\/\/www.forbes.com\/ sites\/mattgardner1\/2020\/09\/19\/gaming-industry-value-200-billion-fortnitemicrotransactions\/.  2020. Report: Gaming Industry Value To Rise 30%. https:\/\/www.forbes.com\/ sites\/mattgardner1\/2020\/09\/19\/gaming-industry-value-200-billion-fortnitemicrotransactions\/.","key":"e_1_3_2_1_3_1"},{"unstructured":"2021. Cloud Gaming Market - Growth Trends COVID-19 Impact and Forecasts. https:\/\/www.reportlinker.com\/p06101217\/Cloud-Gaming-MarketGrowth-Trends-COVID-19-Impact-and-Forecasts.html.  2021. Cloud Gaming Market - Growth Trends COVID-19 Impact and Forecasts. https:\/\/www.reportlinker.com\/p06101217\/Cloud-Gaming-MarketGrowth-Trends-COVID-19-Impact-and-Forecasts.html.","key":"e_1_3_2_1_4_1"},{"volume-title":"GPU Availability and Pricing Update","year":"2021","unstructured":"2021. GPU Availability and Pricing Update : November 2021 . https:\/\/ www.techspot.com\/article\/2369-gpu-pricing-2021-update\/. 2021. GPU Availability and Pricing Update: November 2021. https:\/\/ www.techspot.com\/article\/2369-gpu-pricing-2021-update\/.","key":"e_1_3_2_1_5_1"},{"unstructured":"2021. Nvidia GeForce Now could be an answer to the GPU shortage. https: \/\/www.techadvisor.com\/news\/game\/geforce-now-gpu-shortage-3803897\/.  2021. Nvidia GeForce Now could be an answer to the GPU shortage. https: \/\/www.techadvisor.com\/news\/game\/geforce-now-gpu-shortage-3803897\/.","key":"e_1_3_2_1_6_1"},{"unstructured":"2021. Nvidia Is Doubling Down on a Massive Opportunity. https: \/\/www.nasdaq.com\/articles\/nvidia-is-doubling-down-on-a-massiveopportunity-2021--10--27.  2021. Nvidia Is Doubling Down on a Massive Opportunity. https: \/\/www.nasdaq.com\/articles\/nvidia-is-doubling-down-on-a-massiveopportunity-2021--10--27.","key":"e_1_3_2_1_7_1"},{"unstructured":"2021. Random Bans for \"Crypto mining\". https:\/\/forum.shadow.tech\/activationaccount-billing-31\/random-bans-for-crypto-mining-3382.  2021. Random Bans for \"Crypto mining\". https:\/\/forum.shadow.tech\/activationaccount-billing-31\/random-bans-for-crypto-mining-3382.","key":"e_1_3_2_1_8_1"},{"unstructured":"2021. Shadow Cryptocurrency Ban Situation. https:\/\/forum.shadow.tech\/ activation-account-billing-31\/shadow-cryptocurrency-ban-situation-3062.  2021. Shadow Cryptocurrency Ban Situation. https:\/\/forum.shadow.tech\/ activation-account-billing-31\/shadow-cryptocurrency-ban-situation-3062.","key":"e_1_3_2_1_9_1"},{"unstructured":"2021. Steam just reached 50 000 total games listed. https:\/\/www.pcgamesn.com\/ steam\/total-games.  2021. Steam just reached 50 000 total games listed. https:\/\/www.pcgamesn.com\/ steam\/total-games.","key":"e_1_3_2_1_10_1"},{"unstructured":"2022. Amazon EC2 On-Demand Pricing. https:\/\/aws.amazon.com\/ec2\/pricing\/ondemand\/.  2022. Amazon EC2 On-Demand Pricing. https:\/\/aws.amazon.com\/ec2\/pricing\/ondemand\/.","key":"e_1_3_2_1_11_1"},{"unstructured":"2022. Ethereum Monero Mining Profitability historical chart. https:\/\/ bitinfocharts.com\/comparison\/mining_profitability-eth-xmr.html.  2022. Ethereum Monero Mining Profitability historical chart. https:\/\/ bitinfocharts.com\/comparison\/mining_profitability-eth-xmr.html.","key":"e_1_3_2_1_12_1"},{"unstructured":"2022. LoudPlay. https:\/\/www.loudplay.ru\/.  2022. LoudPlay. https:\/\/www.loudplay.ru\/.","key":"e_1_3_2_1_13_1"},{"unstructured":"2022. ModDB. https:\/\/www.moddb.com\/.  2022. ModDB. https:\/\/www.moddb.com\/.","key":"e_1_3_2_1_14_1"},{"unstructured":"2022. Mods on Steam: Community-made Content For Your Favorite Games. https:\/\/store.steampowered.com\/about\/communitymods\/.  2022. Mods on Steam: Community-made Content For Your Favorite Games. https:\/\/store.steampowered.com\/about\/communitymods\/.","key":"e_1_3_2_1_15_1"},{"unstructured":"2022. Nexus Mods and Community. https:\/\/www.nexusmods.com\/.  2022. Nexus Mods and Community. https:\/\/www.nexusmods.com\/.","key":"e_1_3_2_1_16_1"},{"unstructured":"2022. NiceHash. https:\/\/www.nicehash.com\/.  2022. NiceHash. https:\/\/www.nicehash.com\/.","key":"e_1_3_2_1_17_1"},{"unstructured":"2022. Nvidia Geforce Now. https:\/\/www.nvidia.com\/geforce-now\/.  2022. Nvidia Geforce Now. https:\/\/www.nvidia.com\/geforce-now\/.","key":"e_1_3_2_1_18_1"},{"unstructured":"2022. Shadow Cloud Computing. https:\/\/shadow.tech\/.  2022. Shadow Cloud Computing. https:\/\/shadow.tech\/.","key":"e_1_3_2_1_19_1"},{"unstructured":"2022. Steam. https:\/\/store.steampowered.com\/.  2022. Steam. https:\/\/store.steampowered.com\/.","key":"e_1_3_2_1_20_1"},{"unstructured":"2022. Steam Breaks Record For Most Concurrent Users With Nearly 28 Million Players Online. https:\/\/www.gamespot.com\/articles\/steam-breaks-record-formost-concurrent-users-with-nearly-28-million-players-online\/1100--6499277\/.  2022. Steam Breaks Record For Most Concurrent Users With Nearly 28 Million Players Online. https:\/\/www.gamespot.com\/articles\/steam-breaks-record-formost-concurrent-users-with-nearly-28-million-players-online\/1100--6499277\/.","key":"e_1_3_2_1_21_1"},{"volume-title":"The best gaming PC","year":"2022","unstructured":"2022. The best gaming PC in 2022 . https:\/\/www.pcgamer.com\/best-gaming-pc\/. 2022. The best gaming PC in 2022. https:\/\/www.pcgamer.com\/best-gaming-pc\/.","key":"e_1_3_2_1_22_1"},{"volume-title":"The best gaming PCs","year":"2022","unstructured":"2022. The best gaming PCs in 2022 . https:\/\/www.tomsguide.com\/us\/best-gamingpc,review-2219.html. 2022. The best gaming PCs in 2022. https:\/\/www.tomsguide.com\/us\/best-gamingpc,review-2219.html.","key":"e_1_3_2_1_23_1"},{"unstructured":"2022. Transport Fever 2. https:\/\/www.transportfever2.com\/.  2022. Transport Fever 2. https:\/\/www.transportfever2.com\/.","key":"e_1_3_2_1_24_1"},{"unstructured":"2022. Transport Fever 2 Upload a Mod. https:\/\/www.transportfever2.com\/wiki\/ doku.php?id=modding:publishing.  2022. Transport Fever 2 Upload a Mod. https:\/\/www.transportfever2.com\/wiki\/ doku.php?id=modding:publishing.","key":"e_1_3_2_1_25_1"},{"unstructured":"2022. Unity. https:\/\/unity.com\/.  2022. Unity. https:\/\/unity.com\/.","key":"e_1_3_2_1_26_1"},{"unstructured":"2022. WebMinePool. https:\/\/webminepool.com\/.  2022. WebMinePool. https:\/\/webminepool.com\/.","key":"e_1_3_2_1_27_1"},{"unstructured":"2022. WireShark. https:\/\/www.wireshark.org\/.  2022. WireShark. https:\/\/www.wireshark.org\/.","key":"e_1_3_2_1_28_1"},{"key":"e_1_3_2_1_29_1","volume-title":"Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques. In IEEE Symposium on Security and Privacy (S&P).","author":"Ami Amit Seal","year":"2022","unstructured":"Amit Seal Ami , Nathan Cooper , Kaushal Kafle , Kevin Moran , Denys Poshyvanyk , and Adwait Nadkarni . 2022 . Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques. In IEEE Symposium on Security and Privacy (S&P). Amit Seal Ami, Nathan Cooper, Kaushal Kafle, Kevin Moran, Denys Poshyvanyk, and Adwait Nadkarni. 2022. Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques. In IEEE Symposium on Security and Privacy (S&P)."},{"key":"e_1_3_2_1_30_1","volume-title":"Shervin Shirmohammadi, and Maha Abdallah.","author":"Amiri Maryam","year":"2016","unstructured":"Maryam Amiri , Hussein Al Osman , Shervin Shirmohammadi, and Maha Abdallah. 2016 . Toward Delay-Efficient Game-Aware Data Centers for Cloud Gaming . ACM Transactions on Multimedia Computing, Communications, and Applications (2016). Maryam Amiri, Hussein Al Osman, Shervin Shirmohammadi, and Maha Abdallah. 2016. Toward Delay-Efficient Game-Aware Data Centers for Cloud Gaming. ACM Transactions on Multimedia Computing, Communications, and Applications (2016)."},{"key":"e_1_3_2_1_31_1","volume-title":"Understanding the Mirai Botnet. In USENIX Security Symposium.","author":"Antonakakis Manos","year":"2017","unstructured":"Manos Antonakakis , Tim April , Michael Bailey , Matt Bernhard , Elie Bursztein , Jaime Cochran , Zakir Durumeric , J Alex Halderman , Luca Invernizzi , Michalis Kallitsis , 2017 . Understanding the Mirai Botnet. In USENIX Security Symposium. Manos Antonakakis, Tim April, Michael Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J Alex Halderman, Luca Invernizzi, Michalis Kallitsis, et al. 2017. Understanding the Mirai Botnet. In USENIX Security Symposium."},{"key":"e_1_3_2_1_32_1","volume-title":"USENIX Security Symposium.","author":"Antonakakis Manos","year":"2012","unstructured":"Manos Antonakakis , Roberto Perdisci , Yacin Nadji , Nikolaos Vasiloglou , Saeed Abu-Nimeh , Wenke Lee , and David Dagon . 2012 . From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware . In USENIX Security Symposium. Manos Antonakakis, Roberto Perdisci, Yacin Nadji, Nikolaos Vasiloglou, Saeed Abu-Nimeh, Wenke Lee, and David Dagon. 2012. From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware. In USENIX Security Symposium."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_33_1","DOI":"10.1145\/3366423.3380085"},{"key":"e_1_3_2_1_34_1","volume-title":"USENIX Security Symposium.","author":"Bijmans Hugo LJ","year":"2019","unstructured":"Hugo LJ Bijmans , Tim M Booij , and Christian Doerr . 2019 . Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale . In USENIX Security Symposium. Hugo LJ Bijmans, Tim M Booij, and Christian Doerr. 2019. Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale. In USENIX Security Symposium."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_35_1","DOI":"10.1145\/3319535.3354230"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_36_1","DOI":"10.1109\/MIC.2014.22"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_37_1","DOI":"10.1145\/3372297.3417892"},{"key":"e_1_3_2_1_38_1","volume-title":"You Could Be Mine(d): The Rise of Cryptojacking","author":"Carlin Domhnall","year":"2019","unstructured":"Domhnall Carlin , Jonah Burgess , Philip O'Kane , and Sakir Sezer . 2019. You Could Be Mine(d): The Rise of Cryptojacking . IEEE Security & Privacy ( 2019 ). Domhnall Carlin, Jonah Burgess, Philip O'Kane, and Sakir Sezer. 2019. You Could Be Mine(d): The Rise of Cryptojacking. IEEE Security & Privacy (2019)."},{"key":"e_1_3_2_1_39_1","volume-title":"The Effects of Latency on Player Performance in Cloud-based Games. In Annual Workshop on Network and Systems Support for Games.","author":"Claypool Mark","year":"2014","unstructured":"Mark Claypool and David Finkel . 2014 . The Effects of Latency on Player Performance in Cloud-based Games. In Annual Workshop on Network and Systems Support for Games. Mark Claypool and David Finkel. 2014. The Effects of Latency on Player Performance in Cloud-based Games. In Annual Workshop on Network and Systems Support for Games."},{"key":"e_1_3_2_1_40_1","volume-title":"Network Performance Analysis of the OnLive Thin Client Game System. In Annual Workshop on Network and Systems Support for Games.","author":"Claypool Mark","year":"2012","unstructured":"Mark Claypool , David Finkel , Alexander Grant , and Michael Solano . 2012 . Thin to Win? Network Performance Analysis of the OnLive Thin Client Game System. In Annual Workshop on Network and Systems Support for Games. Mark Claypool, David Finkel, Alexander Grant, and Michael Solano. 2012. Thin to Win? Network Performance Analysis of the OnLive Thin Client Game System. In Annual Workshop on Network and Systems Support for Games."},{"key":"e_1_3_2_1_41_1","volume-title":"GeForce Now and PSNow. Network","author":"Domenico Andrea Di","year":"2021","unstructured":"Andrea Di Domenico , Gianluca Perna , Martino Trevisan , Luca Vassio , and Danilo Giordano . 2021. A Network Analysis on Cloud Gaming: Stadia , GeForce Now and PSNow. Network ( 2021 ). Andrea Di Domenico, Gianluca Perna, Martino Trevisan, Luca Vassio, and Danilo Giordano. 2021. A Network Analysis on Cloud Gaming: Stadia, GeForce Now and PSNow. Network (2021)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_42_1","DOI":"10.1109\/MSP.2016.121"},{"key":"e_1_3_2_1_43_1","volume-title":"Current and Future Trends. In IEEE International Conference on Cloud Computing (CLOUD).","author":"Duan Yucong","year":"2015","unstructured":"Yucong Duan , Guohua Fu , Nianjun Zhou , Xiaobing Sun , Nanjangud C Narendra , and Bo Hu . 2015 . Everything as a Service (XaaS) on the Cloud: Origins , Current and Future Trends. In IEEE International Conference on Cloud Computing (CLOUD). Yucong Duan, Guohua Fu, Nianjun Zhou, Xiaobing Sun, Nanjangud C Narendra, and Bo Hu. 2015. Everything as a Service (XaaS) on the Cloud: Origins, Current and Future Trends. In IEEE International Conference on Cloud Computing (CLOUD)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_44_1","DOI":"10.14722\/ndss.2018.23165"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_45_1","DOI":"10.1145\/2382196.2382283"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_46_1","DOI":"10.1145\/3243734.3243840"},{"key":"e_1_3_2_1_47_1","volume-title":"Placing Virtual Machines to Optimize Cloud Gaming Experience","author":"Hong Hua-Jun","year":"2014","unstructured":"Hua-Jun Hong , De-Yu Chen , Chun-Ying Huang , Kuan-Ta Chen , and Cheng-Hsin Hsu . 2014. Placing Virtual Machines to Optimize Cloud Gaming Experience . IEEE Transactions on Cloud Computing ( 2014 ). Hua-Jun Hong, De-Yu Chen, Chun-Ying Huang, Kuan-Ta Chen, and Cheng-Hsin Hsu. 2014. Placing Virtual Machines to Optimize Cloud Gaming Experience. IEEE Transactions on Cloud Computing (2014)."},{"key":"e_1_3_2_1_48_1","volume-title":"Abdulhameed Alelaiwi, and Atif Alamri.","author":"Hossain M Shamim","year":"2015","unstructured":"M Shamim Hossain , Ghulam Muhammad , Biao Song , Mohammad Mehedi Hassan , Abdulhameed Alelaiwi, and Atif Alamri. 2015 . Audio-Visual Emotion-Aware Cloud Gaming Framework. IEEE Transactions on Circuits and Systems for Video Technology ( 2015). M Shamim Hossain, Ghulam Muhammad, Biao Song, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi, and Atif Alamri. 2015. Audio-Visual Emotion-Aware Cloud Gaming Framework. IEEE Transactions on Circuits and Systems for Video Technology (2015)."},{"key":"e_1_3_2_1_49_1","volume-title":"GamingAnywhere - The First Open Source Cloud Gaming System. ACM Transactions on Multimedia Computing, Communications, and Applications","author":"Huang Chun-Ying","year":"2014","unstructured":"Chun-Ying Huang , Kuan-Ta Chen , De-Yu Chen , Hwai-Jung Hsu , and Cheng-Hsin Hsu . 2014. GamingAnywhere - The First Open Source Cloud Gaming System. ACM Transactions on Multimedia Computing, Communications, and Applications ( 2014 ). Chun-Ying Huang, Kuan-Ta Chen, De-Yu Chen, Hwai-Jung Hsu, and Cheng-Hsin Hsu. 2014. GamingAnywhere - The First Open Source Cloud Gaming System. ACM Transactions on Multimedia Computing, Communications, and Applications (2014)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_50_1","DOI":"10.1145\/2483977.2483981"},{"key":"e_1_3_2_1_51_1","volume-title":"An Experimental Study of Cascading Performance Interference in a Virtualized Environment. ACM SIGMETRICS Performance Evaluation Review","author":"Huang Qun","year":"2013","unstructured":"Qun Huang and Patrick PC Lee . 2013. An Experimental Study of Cascading Performance Interference in a Virtualized Environment. ACM SIGMETRICS Performance Evaluation Review ( 2013 ). Qun Huang and Patrick PC Lee. 2013. An Experimental Study of Cascading Performance Interference in a Virtualized Environment. ACM SIGMETRICS Performance Evaluation Review (2013)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_52_1","DOI":"10.1145\/3243734.3243744"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_53_1","DOI":"10.1145\/3133956.3133994"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_54_1","DOI":"10.1145\/3219617.3219645"},{"key":"e_1_3_2_1_55_1","volume-title":"End-to-End Measurements. In Proceedings of the ACM on Measurement and Analysis of Computing Systems (SIGMETRICS).","author":"Jin Lin","year":"2022","unstructured":"Lin Jin , Shuai Hao , Haining Wang , and Chase Cotton . 2022 . Understanding the Practices of Global Censorship through Accurate , End-to-End Measurements. In Proceedings of the ACM on Measurement and Analysis of Computing Systems (SIGMETRICS). Lin Jin, Shuai Hao, Haining Wang, and Chase Cotton. 2022. Understanding the Practices of Global Censorship through Accurate, End-to-End Measurements. In Proceedings of the ACM on Measurement and Analysis of Computing Systems (SIGMETRICS)."},{"key":"e_1_3_2_1_56_1","volume-title":"Caelus: Verifying the Consistency of Cloud Services with Battery-Powered Devices. In IEEE Symposium on Security and Privacy (S&P).","author":"Kim Beom Heyn","year":"2015","unstructured":"Beom Heyn Kim and David Lie . 2015 . Caelus: Verifying the Consistency of Cloud Services with Battery-Powered Devices. In IEEE Symposium on Security and Privacy (S&P). Beom Heyn Kim and David Lie. 2015. Caelus: Verifying the Consistency of Cloud Services with Battery-Powered Devices. In IEEE Symposium on Security and Privacy (S&P)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_57_1","DOI":"10.1145\/3243734.3243858"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_58_1","DOI":"10.1145\/2742647.2742656"},{"key":"e_1_3_2_1_59_1","volume-title":"An Electromyographic Approach. In Annual Workshop on Network and Systems Support for Games.","author":"Lee Yeng-Ting","year":"2012","unstructured":"Yeng-Ting Lee , Kuan-Ta Chen , Han- I Su , and Chin-Laung Lei . 2012 . Are All Games Equally Cloud-Gaming-Friendly? An Electromyographic Approach. In Annual Workshop on Network and Systems Support for Games. Yeng-Ting Lee, Kuan-Ta Chen, Han-I Su, and Chin-Laung Lei. 2012. Are All Games Equally Cloud-Gaming-Friendly? An Electromyographic Approach. In Annual Workshop on Network and Systems Support for Games."},{"key":"e_1_3_2_1_60_1","volume-title":"LiveRender: A Cloud Gaming System Based on Compressed Graphics Streaming","author":"Liao Xiaofei","year":"2015","unstructured":"Xiaofei Liao , Li Lin , Guang Tan , Hai Jin , Xiaobin Yang , Wei Zhang , and Bo Li. 2015. LiveRender: A Cloud Gaming System Based on Compressed Graphics Streaming . IEEE\/ACM Transactions on Networking ( 2015 ). Xiaofei Liao, Li Lin, Guang Tan, Hai Jin, Xiaobin Yang, Wei Zhang, and Bo Li. 2015. LiveRender: A Cloud Gaming System Based on Compressed Graphics Streaming. IEEE\/ACM Transactions on Networking (2015)."},{"key":"e_1_3_2_1_61_1","volume-title":"CloudFog: Leveraging Fog to Extend Cloud Gaming for Thin-Client MMOG with High Quality of Service","author":"Lin Yuhua","year":"2016","unstructured":"Yuhua Lin and Haiying Shen . 2016. CloudFog: Leveraging Fog to Extend Cloud Gaming for Thin-Client MMOG with High Quality of Service . IEEE Transactions on Parallel and Distributed Systems ( 2016 ). Yuhua Lin and Haiying Shen. 2016. CloudFog: Leveraging Fog to Extend Cloud Gaming for Thin-Client MMOG with High Quality of Service. IEEE Transactions on Parallel and Distributed Systems (2016)."},{"key":"e_1_3_2_1_62_1","volume-title":"Thermal Covert Channels on Multi-core Platforms. In USENIX Security Symposium.","author":"Masti Ramya Jayaram","year":"2015","unstructured":"Ramya Jayaram Masti , Devendra Rai , Aanjhan Ranganathan , Christian M\u00fcller , Lothar Thiele , and Srdjan Capkun . 2015 . Thermal Covert Channels on Multi-core Platforms. In USENIX Security Symposium. Ramya Jayaram Masti, Devendra Rai, Aanjhan Ranganathan, Christian M\u00fcller, Lothar Thiele, and Srdjan Capkun. 2015. Thermal Covert Channels on Multi-core Platforms. In USENIX Security Symposium."},{"key":"e_1_3_2_1_63_1","volume-title":"MINOS: A Lightweight Real-Time Cryptojacking Detection System. In ISOC Network and Distributed System Security Symposium (NDSS).","author":"Naseem Faraz Naseem","year":"2021","unstructured":"Faraz Naseem Naseem , Ahmet Aris , Leonardo Babun , Ege Tekiner , and A Selcuk Uluagac . 2021 . MINOS: A Lightweight Real-Time Cryptojacking Detection System. In ISOC Network and Distributed System Security Symposium (NDSS). Faraz Naseem Naseem, Ahmet Aris, Leonardo Babun, Ege Tekiner, and A Selcuk Uluagac. 2021. MINOS: A Lightweight Real-Time Cryptojacking Detection System. In ISOC Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_64_1","volume-title":"Developing Cloud Business Models: A Case Study on Cloud Gaming","author":"Ojala Arto","year":"2011","unstructured":"Arto Ojala and Pasi Tyrvainen . 2011. Developing Cloud Business Models: A Case Study on Cloud Gaming . IEEE Software ( 2011 ). Arto Ojala and Pasi Tyrvainen. 2011. Developing Cloud Business Models: A Case Study on Cloud Gaming. IEEE Software (2011)."},{"key":"e_1_3_2_1_65_1","volume-title":"Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds. In ACM Conference on Computer and Communications Security (CCS).","author":"Ristenpart Thomas","year":"2009","unstructured":"Thomas Ristenpart , Eran Tromer , Hovav Shacham , and Stefan Savage . 2009 . Hey, You , Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds. In ACM Conference on Computer and Communications Security (CCS). Thomas Ristenpart, Eran Tromer, Hovav Shacham, and Stefan Savage. 2009. Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds. In ACM Conference on Computer and Communications Security (CCS)."},{"key":"e_1_3_2_1_66_1","volume-title":"Cloud Computing's Killer App: Gaming","author":"Ross Philip E","year":"2009","unstructured":"Philip E Ross . 2009. Cloud Computing's Killer App: Gaming . IEEE Spectrum ( 2009 ). Philip E Ross. 2009. Cloud Computing's Killer App: Gaming. IEEE Spectrum (2009)."},{"key":"e_1_3_2_1_67_1","volume-title":"A First Look at Thermal Attacks in Multi-Tenant Data Centers. ACM SIGMETRICS Performance Evaluation Review","author":"Shao Zhihui","year":"2019","unstructured":"Zhihui Shao , Mohammad A Islam , and Shaolei Ren . 2019. A First Look at Thermal Attacks in Multi-Tenant Data Centers. ACM SIGMETRICS Performance Evaluation Review ( 2019 ). Zhihui Shao, Mohammad A Islam, and Shaolei Ren. 2019. A First Look at Thermal Attacks in Multi-Tenant Data Centers. ACM SIGMETRICS Performance Evaluation Review (2019)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_68_1","DOI":"10.1145\/1653662.1653738"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_69_1","DOI":"10.14722\/ndss.2018.23221"},{"key":"e_1_3_2_1_70_1","volume-title":"Towards Understanding the Relationship Between Game Type and Network Traffic for Cloud Gaming. In IEEE International Conference on Multimedia and Expo Workshops (ICMEW).","author":"Suznjevic Mirko","year":"2014","unstructured":"Mirko Suznjevic , Justus Beyer , Lea Skorin-Kapov , Sebastian Moller , and Nikola Sorsa . 2014 . Towards Understanding the Relationship Between Game Type and Network Traffic for Cloud Gaming. In IEEE International Conference on Multimedia and Expo Workshops (ICMEW). Mirko Suznjevic, Justus Beyer, Lea Skorin-Kapov, Sebastian Moller, and Nikola Sorsa. 2014. Towards Understanding the Relationship Between Game Type and Network Traffic for Cloud Gaming. In IEEE International Conference on Multimedia and Expo Workshops (ICMEW)."},{"key":"e_1_3_2_1_71_1","volume-title":"SoK: Cryptojacking Malware. In IEEE European Symposium on Security and Privacy (EuroS&P).","author":"Tekiner Ege","year":"2021","unstructured":"Ege Tekiner , Abbas Acar , A Selcuk Uluagac , Engin Kirda , and Ali Aydin Selcuk . 2021 . SoK: Cryptojacking Malware. In IEEE European Symposium on Security and Privacy (EuroS&P). Ege Tekiner, Abbas Acar, A Selcuk Uluagac, Engin Kirda, and Ali Aydin Selcuk. 2021. SoK: Cryptojacking Malware. In IEEE European Symposium on Security and Privacy (EuroS&P)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_72_1","DOI":"10.1145\/2382196.2382228"},{"key":"e_1_3_2_1_73_1","volume-title":"Whispers in the HyperSpace: High-Bandwidth and Reliable Covert Channel Attacks Inside the Cloud. In USENIX Security Symposium.","author":"Wu Zhenyu","year":"2012","unstructured":"Zhenyu Wu , Zhang Xu , and Haining Wang . 2012 . Whispers in the HyperSpace: High-Bandwidth and Reliable Covert Channel Attacks Inside the Cloud. In USENIX Security Symposium. Zhenyu Wu, Zhang Xu, and Haining Wang. 2012. Whispers in the HyperSpace: High-Bandwidth and Reliable Covert Channel Attacks Inside the Cloud. In USENIX Security Symposium."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_74_1","DOI":"10.1145\/2736277.2741650"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_75_1","DOI":"10.14722\/ndss.2014.23235"},{"key":"e_1_3_2_1_76_1","volume-title":"Timely Cloud Gaming. In IEEE International Conference on Computer Communications (INFOCOM).","author":"Yates Roy D","year":"2017","unstructured":"Roy D Yates , Mehrnaz Tavan , Yi Hu , and Dipankar Raychaudhuri . 2017 . Timely Cloud Gaming. In IEEE International Conference on Computer Communications (INFOCOM). Roy D Yates, Mehrnaz Tavan, Yi Hu, and Dipankar Raychaudhuri. 2017. Timely Cloud Gaming. In IEEE International Conference on Computer Communications (INFOCOM)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_77_1","DOI":"10.1145\/3442381.3450100"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_78_1","DOI":"10.1109\/SP.2011.31"},{"key":"e_1_3_2_1_79_1","volume-title":"ACM Conference on Computer and Communications Security (CCS).","author":"Zhang Yinqian","year":"2012","unstructured":"Yinqian Zhang , Ari Juels , Michael K Reiter , and Thomas Ristenpart . 2012 . CrossVM Side Channels and Their Use to Extract Private Keys . In ACM Conference on Computer and Communications Security (CCS). Yinqian Zhang, Ari Juels, Michael K Reiter, and Thomas Ristenpart. 2012. CrossVM Side Channels and Their Use to Extract Private Keys. In ACM Conference on Computer and Communications Security (CCS)."},{"key":"e_1_3_2_1_80_1","volume-title":"CrossTenant Side-Channel Attacks in PaaS Clouds. In ACM Conference on Computer and Communications Security (CCS).","author":"Zhang Yinqian","year":"2014","unstructured":"Yinqian Zhang , Ari Juels , Michael K Reiter , and Thomas Ristenpart . 2014 . CrossTenant Side-Channel Attacks in PaaS Clouds. In ACM Conference on Computer and Communications Security (CCS). Yinqian Zhang, Ari Juels, Michael K Reiter, and Thomas Ristenpart. 2014. CrossTenant Side-Channel Attacks in PaaS Clouds. In ACM Conference on Computer and Communications Security (CCS)."}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"acronym":"CCS '22","name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","location":"Los Angeles CA USA"},"container-title":["Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3560647","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3560647","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3560647","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:48:59Z","timestamp":1750182539000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3560647"}},"subtitle":["Exploring the Misuse of Cloud Gaming Services"],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":80,"alternative-id":["10.1145\/3548606.3560647","10.1145\/3548606"],"URL":"https:\/\/doi.org\/10.1145\/3548606.3560647","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}