{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:46:09Z","timestamp":1759092369998,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Swedish Foundation for Strategic Research","award":["Project 3066"],"award-info":[{"award-number":["Project 3066"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,11]]},"DOI":"10.1145\/3560828.3564007","type":"proceedings-article","created":{"date-parts":[[2022,11,4]],"date-time":"2022-11-04T15:38:50Z","timestamp":1667576330000},"page":"11-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Multi-variant Execution at the Edge"],"prefix":"10.1145","author":[{"given":"Javier","family":"Cabrera Arteaga","sequence":"first","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"given":"Pierre","family":"Laperdrix","sequence":"additional","affiliation":[{"name":"Centre National de la Recherche Scientifique CNRS, Paris, France"}]},{"given":"Martin","family":"Monperrus","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"given":"Benoit","family":"Baudry","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2022,11,7]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2020. Markdown to HTML. https:\/\/markdown-converter.edgecompute.app\/  2020. Markdown to HTML. https:\/\/markdown-converter.edgecompute.app\/"},{"key":"e_1_3_2_2_2_1","unstructured":"2020. The power of serverless 72 times over. https:\/\/www.fastly.com\/blog\/thepower-of-serverless-at-the-edge  2020. The power of serverless 72 times over. https:\/\/www.fastly.com\/blog\/thepower-of-serverless-at-the-edge"},{"key":"e_1_3_2_2_3_1","unstructured":"2021. Global CDN Disruption. https:\/\/status.fastly.com\/incidents\/vpk0ssybt3bj  2021. Global CDN Disruption. https:\/\/status.fastly.com\/incidents\/vpk0ssybt3bj"},{"key":"e_1_3_2_2_4_1","unstructured":"2021. The New York Times on failure risk and prepping for the 2016 US presidential election -- Fastly. https:\/\/www.fastly.com\/blog\/new-york-times-on-failure-riskand-prepping-2016-us-presidential-election  2021. The New York Times on failure risk and prepping for the 2016 US presidential election -- Fastly. https:\/\/www.fastly.com\/blog\/new-york-times-on-failure-riskand-prepping-2016-us-presidential-election"},{"key":"e_1_3_2_2_5_1","unstructured":"2021. WebAssembly System Interface. https:\/\/github.com\/WebAssembly\/WASI  2021. WebAssembly System Interface. https:\/\/github.com\/WebAssembly\/WASI"},{"volume-title":"Cryptographers' track at the RSA conference","author":"Aci\u00e7mez Onur","key":"e_1_3_2_2_6_1","unstructured":"Onur Aci\u00e7mez , Werner Schindler , and \u00c7etin K Ko\u00e7 . 2007. Cache based remote timing attack on the AES . In Cryptographers' track at the RSA conference . Springer , 271--286. Onur Aci\u00e7mez, Werner Schindler, and \u00c7etin K Ko\u00e7. 2007. Cache based remote timing attack on the AES. In Cryptographers' track at the RSA conference. Springer, 271--286."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2019.8661202"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2014.150"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948147"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3281662"},{"key":"e_1_3_2_2_11_1","unstructured":"Daniel J Bernstein. 2005. Cache-timing attacks on AES. (2005).  Daniel J Bernstein. 2005. Cache-timing attacks on AES. (2005)."},{"volume-title":"Proceedings of the USENIX Security Symposium.","author":"Bhatkar Sandeep","key":"e_1_3_2_2_12_1","unstructured":"Sandeep Bhatkar , Daniel C. DuVarney , and R. Sekar . 2003. Address obfuscation: an efficient approach to combat a board range of memory error exploits . In Proceedings of the USENIX Security Symposium. Sandeep Bhatkar, Daniel C. DuVarney, and R. Sekar. 2003. Address obfuscation: an efficient approach to combat a board range of memory error exploits. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_2_13_1","volume-title":"Proceedings of the USENIX Security Symposium. 271--286","author":"Bhatkar Sandeep","year":"2005","unstructured":"Sandeep Bhatkar , Ron Sekar , and Daniel C DuVarney . 2005 . Efficient techniques for comprehensive protection from memory error exploits . In Proceedings of the USENIX Security Symposium. 271--286 . Sandeep Bhatkar, Ron Sekar, and Daniel C DuVarney. 2005. Efficient techniques for comprehensive protection from memory error exploits. In Proceedings of the USENIX Security Symposium. 271--286."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380085"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00007"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2007.358924"},{"key":"e_1_3_2_2_17_1","volume-title":"Proc. of ICWE","author":"Bryant David","year":"2020","unstructured":"David Bryant . 2020 . Webassembly outside the browser: A new foundation for pervasive computing . In Proc. of ICWE 2020. 9--12. David Bryant. 2020. Webassembly outside the browser: A new foundation for pervasive computing. In Proc. of ICWE 2020. 9--12."},{"key":"e_1_3_2_2_18_1","volume-title":"NDSS","author":"Cabrera-Arteaga Javier","year":"2021","unstructured":"Javier Cabrera-Arteaga , Orestis Floros Malivitsis , Oscar Vera-P\u00e9rez , Benoit Baudry , and Martin Monperrus . 2021 . CROW: Code Diversification for WebAssembly. In MADWeb , NDSS 2021. Javier Cabrera-Arteaga, Orestis Floros Malivitsis, Oscar Vera-P\u00e9rez, Benoit Baudry, and Martin Monperrus. 2021. CROW: Code Diversification for WebAssembly. In MADWeb, NDSS 2021."},{"key":"e_1_3_2_2_20_1","volume-title":"A hybrid edge-cloud architecture for reducing on-demand gaming latency. Multimedia systems 20, 5","author":"Choy Sharon","year":"2014","unstructured":"Sharon Choy , Bernard Wong , Gwendal Simon , and Catherine Rosenberg . 2014. A hybrid edge-cloud architecture for reducing on-demand gaming latency. Multimedia systems 20, 5 ( 2014 ), 503--519. Sharon Choy, Bernard Wong, Gwendal Simon, and Catherine Rosenberg. 2014. A hybrid edge-cloud architecture for reducing on-demand gaming latency. Multimedia systems 20, 5 (2014), 503--519."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(93)90054-9"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2400682.2400683"},{"key":"e_1_3_2_2_23_1","volume-title":"Proc. of USENIX Security Symposium","author":"Cox Benjamin","year":"2006","unstructured":"Benjamin Cox , David Evans , Adrian Filipi , Jonathan Rowanhill , Wei Hu , Jack Davidson , John Knight , Anh Nguyen-Tuong , and Jason Hiser . 2006 . N-variant systems: a secretless framework for security through diversity . In Proc. of USENIX Security Symposium ( Vancouver, B.C., Canada) (USENIX-SS'06). http:\/\/dl.acm.org\/citation. cfm?id=1267336.1267344 Benjamin Cox, David Evans, Adrian Filipi, Jonathan Rowanhill,Wei Hu, Jack Davidson, John Knight, Anh Nguyen-Tuong, and Jason Hiser. 2006. N-variant systems: a secretless framework for security through diversity. In Proc. of USENIX Security Symposium (Vancouver, B.C., Canada) (USENIX-SS'06). http:\/\/dl.acm.org\/citation. cfm?id=1267336.1267344"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"crossref","unstructured":"Stephen Crane Andrei Homescu Stefan Brunthaler Per Larsen and Michael Franz. 2015. Thwarting Cache Side-Channel Attacks Through Dynamic Software Diversity. In NDSS. 8--11.  Stephen Crane Andrei Homescu Stefan Brunthaler Per Larsen and Michael Franz. 2015. Thwarting Cache Side-Channel Attacks Through Dynamic Software Diversity. In NDSS. 8--11.","DOI":"10.14722\/ndss.2015.23264"},{"key":"e_1_3_2_2_25_1","volume-title":"Isomeron: Code Randomization Resilient to (Just-In-Time) Return- Oriented Programming. In NDSS.","author":"Davi Lucas","year":"2015","unstructured":"Lucas Davi , Christopher Liebchen , Ahmad-Reza Sadeghi , Kevin Z Snow , and Fabian Monrose . 2015 . Isomeron: Code Randomization Resilient to (Just-In-Time) Return- Oriented Programming. In NDSS. Lucas Davi, Christopher Liebchen, Ahmad-Reza Sadeghi, Kevin Z Snow, and Fabian Monrose. 2015. Isomeron: Code Randomization Resilient to (Just-In-Time) Return- Oriented Programming. In NDSS."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/HOTOS.1997.595185"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062363"},{"key":"e_1_3_2_2_28_1","volume-title":"Announcing Lucet: Fastly's native WebAssembly compiler and runtime. Technical Report. https:\/\/www.fastly.com\/blog\/announcing-lucet-fastlynative- webassembly-compiler-runtime","author":"Hickey Pat","year":"2018","unstructured":"Pat Hickey . 2018 . Announcing Lucet: Fastly's native WebAssembly compiler and runtime. Technical Report. https:\/\/www.fastly.com\/blog\/announcing-lucet-fastlynative- webassembly-compiler-runtime Pat Hickey. 2018. Announcing Lucet: Fastly's native WebAssembly compiler and runtime. Technical Report. https:\/\/www.fastly.com\/blog\/announcing-lucet-fastlynative- webassembly-compiler-runtime"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450138"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1852666.1852708"},{"key":"e_1_3_2_2_32_1","volume-title":"EAI International Conference on Body Area Networks. Springer, Cham, 381--389","author":"Jacobsson Martin","year":"2018","unstructured":"Martin Jacobsson and Jonas W\u00e5hsl\u00e9n . 2018 . Virtual machine execution for wearables based on webassembly . In EAI International Conference on Body Area Networks. Springer, Cham, 381--389 . Martin Jacobsson and Jonas W\u00e5hsl\u00e9n. 2018. Virtual machine execution for wearables based on webassembly. In EAI International Conference on Body Area Networks. Springer, Cham, 381--389."},{"key":"e_1_3_2_2_33_1","volume-title":"SFI safety for native-compiled Wasm","author":"Johnson Evan","year":"2021","unstructured":"Evan Johnson , David Thien , Yousef Alhessi , Shravan Narayan , Fraser Brown , Sorin Lerner , Tyler McMullen , Stefan Savage , and Deian Stefan . 2021. SFI safety for native-compiled Wasm . NDSS. Internet Society ( 2021 ). Evan Johnson, David Thien, Yousef Alhessi, Shravan Narayan, Fraser Brown, Sorin Lerner, Tyler McMullen, Stefan Savage, and Deian Stefan. 2021. SFI safety for native-compiled Wasm. NDSS. Internet Society (2021)."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948146"},{"key":"e_1_3_2_2_35_1","unstructured":"Dohyeong Kim Yonghwi Kwon William N. Sumner Xiangyu Zhang and Dongyan Xu. 2015. Dual Execution for On the Fly Fine Grained Execution Comparison. SIGPLAN Not. (2015).  Dohyeong Kim Yonghwi Kwon William N. Sumner Xiangyu Zhang and Dongyan Xu. 2015. Dual Execution for On the Fly Fine Grained Execution Comparison. SIGPLAN Not. (2015)."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.46"},{"key":"e_1_3_2_2_37_1","volume-title":"SaVioR: Thwarting Stack-Based Memory Safety Violations by Randomizing Stack Layout","author":"Lee Seongman","year":"2021","unstructured":"Seongman Lee , Hyeonwoo Kang , Jinsoo Jang , and Brent Byunghoon Kang . 2021. SaVioR: Thwarting Stack-Based Memory Safety Violations by Randomizing Stack Layout . IEEE Transactions on Dependable and Secure Computing ( 2021 ). https: \/\/ieeexplore.ieee.org\/iel7\/8858\/4358699\/09369900.pdf Seongman Lee, Hyeonwoo Kang, Jinsoo Jang, and Brent Byunghoon Kang. 2021. SaVioR: Thwarting Stack-Based Memory Safety Violations by Randomizing Stack Layout. IEEE Transactions on Dependable and Secure Computing (2021). https: \/\/ieeexplore.ieee.org\/iel7\/8858\/4358699\/09369900.pdf"},{"key":"e_1_3_2_2_38_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Lehmann Daniel","year":"2020","unstructured":"Daniel Lehmann , Johannes Kinder , and Michael Pradel . 2020 . Everything Old is New Again: Binary Security of WebAssembly . In 29th USENIX Security Symposium (USENIX Security 20) . USENIX Association. Daniel Lehmann, Johannes Kinder, and Michael Pradel. 2020. Everything Old is New Again: Binary Security of WebAssembly. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_19"},{"key":"e_1_3_2_2_40_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Liljestrand Hans","year":"2021","unstructured":"Hans Liljestrand , Thomas Nyman , Lachlan J Gunn , Jan-Erik Ekberg , and N Asokan . 2021 . PACStack: an Authenticated Call Stack . In 30th USENIX Security Symposium (USENIX Security 21) . Hans Liljestrand, Thomas Nyman, Lachlan J Gunn, Jan-Erik Ekberg, and N Asokan. 2021. PACStack: an Authenticated Call Stack. In 30th USENIX Security Symposium (USENIX Security 21)."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2878234"},{"key":"#cr-split#-e_1_3_2_2_42_1.1","doi-asserted-by":"crossref","unstructured":"H. B. Mann and D. R. Whitney. 1947. On a Test of Whether one of Two Random Variables is Stochastically Larger than the Other. Ann. Math. Statist. 18 1 (03 1947) 50--60. https:\/\/doi.org\/10.1214\/aoms\/1177730491 10.1214\/aoms","DOI":"10.1214\/aoms\/1177730491"},{"key":"#cr-split#-e_1_3_2_2_42_1.2","doi-asserted-by":"crossref","unstructured":"H. B. Mann and D. R. Whitney. 1947. On a Test of Whether one of Two Random Variables is Stochastically Larger than the Other. Ann. Math. Statist. 18 1 (03 1947) 50--60. https:\/\/doi.org\/10.1214\/aoms\/1177730491","DOI":"10.1214\/aoms\/1177730491"},{"key":"e_1_3_2_2_43_1","volume-title":"21st USENIX Security Symposium (USENIX Security . 617--630","author":"Maurer Matthew","year":"2012","unstructured":"Matthew Maurer and David Brumley . 2012 . TACHYON: Tandem execution for efficient live patch testing . In 21st USENIX Security Symposium (USENIX Security . 617--630 . Matthew Maurer and David Brumley. 2012. TACHYON: Tandem execution for efficient live patch testing. In 21st USENIX Security Symposium (USENIX Security . 617--630."},{"key":"#cr-split#-e_1_3_2_2_44_1.1","doi-asserted-by":"crossref","unstructured":"P. Mendki. 2020. Evaluating Webassembly Enabled Serverless Approach for Edge Computing. In 2020 IEEE Cloud Summit. 161--166. https:\/\/doi.org\/10.1109\/IEEECloudSummit48914.2020.00031 10.1109\/IEEECloudSummit48914.2020.00031","DOI":"10.1109\/IEEECloudSummit48914.2020.00031"},{"key":"#cr-split#-e_1_3_2_2_44_1.2","doi-asserted-by":"crossref","unstructured":"P. Mendki. 2020. Evaluating Webassembly Enabled Serverless Approach for Edge Computing. In 2020 IEEE Cloud Summit. 161--166. https:\/\/doi.org\/10.1109\/IEEECloudSummit48914.2020.00031","DOI":"10.1109\/IEEECloudSummit48914.2020.00031"},{"key":"e_1_3_2_2_45_1","volume-title":"USENIX Security Symposium.","author":"Narayan Shravan","year":"2021","unstructured":"Shravan Narayan , Craig Disselkoen , Daniel Moghimi , Sunjay Cauligi , Evan Johnson , Zhao Gang , Anjo Vahldiek-Oberwagner , Ravi Sahita , Hovav Shacham , Dean Tullsen , 2021 . Swivel: Hardening WebAssembly against Spectre . In USENIX Security Symposium. Shravan Narayan, Craig Disselkoen, Daniel Moghimi, Sunjay Cauligi, Evan Johnson, Zhao Gang, Anjo Vahldiek-Oberwagner, Ravi Sahita, Hovav Shacham, Dean Tullsen, et al. 2021. Swivel: Hardening WebAssembly against Spectre. In USENIX Security Symposium."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030101"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"crossref","unstructured":"Sebastian \u00d6sterlund Koen Koning Pierre Olivier Antonio Barbalace Herbert Bos and Cristiano Giuffrida. 2019. kMVX: Detecting kernel information leaks with multi-variant execution. In ASPLOS.  Sebastian \u00d6sterlund Koen Koning Pierre Olivier Antonio Barbalace Herbert Bos and Cristiano Giuffrida. 2019. kMVX: Detecting kernel information leaks with multi-variant execution. In ASPLOS.","DOI":"10.1145\/3297858.3304054"},{"key":"e_1_3_2_2_48_1","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Rane Ashay","year":"2015","unstructured":"Ashay Rane , Calvin Lin , and Mohit Tiwari . 2015 . Raccoon: Closing digital sidechannels through obfuscated execution . In 24th USENIX Security Symposium (USENIX Security 15) . 431--446. Ashay Rane, Calvin Lin, and Mohit Tiwari. 2015. Raccoon: Closing digital sidechannels through obfuscated execution. In 24th USENIX Security Symposium (USENIX Security 15). 431--446."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1979.234183"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1519065.1519071"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.18"},{"key":"e_1_3_2_2_53_1","volume-title":"USENIX Annual Technical Conference. 419--433","author":"Shillaker Simon","year":"2020","unstructured":"Simon Shillaker and Peter Pietzuch . 2020 . Faasm: Lightweight isolation for efficient stateful serverless computing . In USENIX Annual Technical Conference. 419--433 . Simon Shillaker and Peter Pietzuch. 2020. Faasm: Lightweight isolation for efficient stateful serverless computing. In USENIX Annual Technical Conference. 419--433."},{"key":"e_1_3_2_2_55_1","volume-title":"Compositional Information Flow Analysis for WebAssembly Programs. In 2020 IEEE 20th International Working Conference on Source Code Analysis and Manipulation (SCAM). IEEE, 13--24","author":"Sti\u00e9venart Quentin","year":"2020","unstructured":"Quentin Sti\u00e9venart and Coen De Roover . 2020 . Compositional Information Flow Analysis for WebAssembly Programs. In 2020 IEEE 20th International Working Conference on Source Code Analysis and Manipulation (SCAM). IEEE, 13--24 . Quentin Sti\u00e9venart and Coen De Roover. 2020. Compositional Information Flow Analysis for WebAssembly Programs. In 2020 IEEE 20th International Working Conference on Source Code Analysis and Manipulation (SCAM). IEEE, 13--24."},{"key":"e_1_3_2_2_56_1","volume-title":"On Multi-Access Edge Computing: A Survey of the Emerging 5G Network Edge Cloud Architecture and Orchestration","author":"Taleb Tarik","year":"2017","unstructured":"Tarik Taleb , Konstantinos Samdanis , Badr Mada , Hannu Flinck , Sunny Dutta , and Dario Sabella . 2017. On Multi-Access Edge Computing: A Survey of the Emerging 5G Network Edge Cloud Architecture and Orchestration . IEEE Comm. Surveys & Tutorials 19, 3 ( 2017 ). Tarik Taleb, Konstantinos Samdanis, Badr Mada, Hannu Flinck, Sunny Dutta, and Dario Sabella. 2017. On Multi-Access Edge Computing: A Survey of the Emerging 5G Network Edge Cloud Architecture and Orchestration. IEEE Comm. Surveys & Tutorials 19, 3 (2017)."},{"key":"e_1_3_2_2_58_1","article-title":"Cloning your gadgets: Complete ROP attack immunity with multi-variant execution","volume":"13","author":"Volckaert Stijn","year":"2015","unstructured":"Stijn Volckaert , Bart Coppens , and Bjorn De Sutter . 2015 . Cloning your gadgets: Complete ROP attack immunity with multi-variant execution . IEEE Transactions on Dependable and Secure Computing 13 , 4 (2015). Stijn Volckaert, Bart Coppens, and Bjorn De Sutter. 2015. Cloning your gadgets: Complete ROP attack immunity with multi-variant execution. IEEE Transactions on Dependable and Secure Computing 13, 4 (2015).","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447852.3458714"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378492"}],"event":{"name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Los Angeles CA USA","acronym":"CCS '22"},"container-title":["Proceedings of the 9th ACM Workshop on Moving Target Defense"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3560828.3564007","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3560828.3564007","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:34Z","timestamp":1750186834000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3560828.3564007"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":57,"alternative-id":["10.1145\/3560828.3564007","10.1145\/3560828"],"URL":"https:\/\/doi.org\/10.1145\/3560828.3564007","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}