{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T13:37:12Z","timestamp":1758807432829,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,6,5]],"date-time":"2023-06-05T00:00:00Z","timestamp":1685923200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"US Office of Naval Research","award":["N00014-21-1-2520"],"award-info":[{"award-number":["N00014-21-1-2520"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,6,5]]},"DOI":"10.1145\/3583781.3590272","type":"proceedings-article","created":{"date-parts":[[2023,5,31]],"date-time":"2023-05-31T22:40:19Z","timestamp":1685572819000},"page":"563-568","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["MAYAVI: A Cyber-Deception Hardware for Memory Load-Stores"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2177-393X","authenticated-orcid":false,"given":"Preet","family":"Derasari","sequence":"first","affiliation":[{"name":"The George Washington University, Washington, DC, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1865-5470","authenticated-orcid":false,"given":"Kailash","family":"Gogineni","sequence":"additional","affiliation":[{"name":"The George Washington University, Washington, DC, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7084-7560","authenticated-orcid":false,"given":"Guru","family":"Venkataramani","sequence":"additional","affiliation":[{"name":"The George Washington University, Washington, DC, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2023,6,5]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Harsh Kumar Verma, and Lalit Kumar Awasthi","author":"Aidan Jagmeet Singh","year":"2017","unstructured":"Jagmeet Singh Aidan, Harsh Kumar Verma, and Lalit Kumar Awasthi. 2017. Comprehensive survey on petya ransomware attack. In IEEE ICNGCIS. 122--125."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-02110-8"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Frederico Araujo Kevin W Hamlen Sebastian Biedermann and Stefan Katzenbeisser. 2014. From patches to honey-patches: Lightweight attacker misdirection deception and disinformation. In ACM CCS. 942--953.","DOI":"10.1145\/2660267.2660329"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Leyla Bilge and Tudor Dumitracs. 2012. Before we knew it: an empirical study of zero-day attacks in the real world. In ACM CCS. 833--844.","DOI":"10.1145\/2382196.2382284"},{"key":"e_1_3_2_1_5_1","volume-title":"Wood","author":"Binkert Nathan","year":"2011","unstructured":"Nathan Binkert, Bradford Beckmann, Gabriel Black, Steven K. Reinhardt, Ali Saidi, Arkaprava Basu, Joel Hestness, Derek R. Hower, Tushar Krishna, Somayeh Sardashti, Rathijit Sen, Korey Sewell, Muhammad Shoaib, Nilay Vaish, Mark D. Hill, and David A. Wood. 2011. The gem5 simulator. ACM SIGARCH computer architecture news, Vol. 39, 2 (2011), 1--7."},{"key":"e_1_3_2_1_6_1","volume-title":"Cc-hunter: Uncovering covert timing channels on shared processor hardware","author":"Chen Jie","year":"2014","unstructured":"Jie Chen and Guru Venkataramani. 2014. Cc-hunter: Uncovering covert timing channels on shared processor hardware. In IEEE\/ACM MICRO. 216--228."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3034443"},{"key":"e_1_3_2_1_8_1","volume-title":"Intel SGX explained. Cryptology ePrint Archive","author":"Costan Victor","year":"2016","unstructured":"Victor Costan and Srinivas Devadas. 2016. Intel SGX explained. Cryptology ePrint Archive (2016)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"George Cox Charles Dike and DJ Johnston. 2011. Intel's digital random number generator (DRNG). In 2011 HCS. 1--13.","DOI":"10.1109\/HOTCHIPS.2011.7477490"},{"key":"e_1_3_2_1_10_1","unstructured":"Srinivas Devadas. 1998. Computer Arithmetic. https:\/\/people.csail.mit.edu\/devadas\/6.004\/Lectures\/lect17\/index.htm"},{"key":"e_1_3_2_1_11_1","volume-title":"USENIX Annual Technical Conference","author":"Egele Manuel","year":"2007","unstructured":"Manuel Egele, Christopher Kruegel, Engin Kirda, Heng Yin, and Dawn Song. 2007. Dynamic spyware analysis. USENIX Annual Technical Conference (2007)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10766-018-0609-3"},{"key":"e_1_3_2_1_13_1","volume-title":"Milovs Doroslovavc ki, and Guru Venkataramani","author":"Fang Hongyu","year":"2022","unstructured":"Hongyu Fang, Milovs Doroslovavc ki, and Guru Venkataramani. 2022. SC-K9: A Self-synchronizing Framework to Counter Micro-architectural Side Channels. In IEEE ASP-DAC. 11--18."},{"key":"e_1_3_2_1_14_1","unstructured":"Christina Fowler Mike Goffin Bill Hill Richard Lamourine and Andrew Sovern. 2020. An introduction to Mitre Shield - Mitre Corporation. https:\/\/shield.mitre.org\/resources\/downloads\/Introduction_to_MITRE_Shield.pdf"},{"key":"e_1_3_2_1_15_1","volume-title":"Salessawi Ferede Yitbarek, Misiker Tadesse Aga","author":"Gallagher Mark","year":"2019","unstructured":"Mark Gallagher, Lauren Biernacki, Shibo Chen, Zelalem Birhanu Aweke, Salessawi Ferede Yitbarek, Misiker Tadesse Aga, Austin Harris, Zhixing Xu, Baris Kasikci, Valeria Bertacco, et al. 2019. Morpheus: A vulnerability-tolerant secure architecture based on ensembles of moving target defenses with churn. In ACM ASPLOS. 469--484."},{"key":"e_1_3_2_1_16_1","volume-title":"Foreseer: Efficiently Forecasting Malware Event Series with Long Short-Term Memory","author":"Gogineni Kailash","year":"2022","unstructured":"Kailash Gogineni, Preet Derasari, and Guru Venkataramani. 2022. Foreseer: Efficiently Forecasting Malware Event Series with Long Short-Term Memory. In IEEE SEED. 97--108."},{"volume-title":"Ransomware Revealed","author":"Hassan N.A.","key":"e_1_3_2_1_17_1","unstructured":"N.A. Hassan. 2019. Ransomware Families. In Ransomware Revealed. Springer, 47--68."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2969514"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Jason Landsborough Luke Carpenter Braulio Coronado Sunny Fugate Kimberly Ferguson-Walter and Dirk Van Bruggen. 2021. Towards Self-Adaptive Cyber Deception for Defense.. In HICSS. 1--10.","DOI":"10.24251\/HICSS.2021.244"},{"volume-title":"Random fill cache architecture","author":"Liu Fangfei","key":"e_1_3_2_1_20_1","unstructured":"Fangfei Liu and Ruby B Lee. 2014. Random fill cache architecture. In IEEE\/ACM MICRO. 203--215."},{"key":"e_1_3_2_1_21_1","volume-title":"Overview of meltdown and spectre patches and their impacts. Advanced Microkernel Operating Systems","author":"Marc L\u00f6w.","year":"2018","unstructured":"Marc L\u00f6w. 2018. Overview of meltdown and spectre patches and their impacts. Advanced Microkernel Operating Systems (2018), 53."},{"key":"e_1_3_2_1_22_1","volume-title":"Retrieved May","volume":"1","author":"Mamedov Orkhan","year":"2017","unstructured":"Orkhan Mamedov, Fedor Sinitsyn, and Anton Ivanov. 2017. Bad rabbit ransomware. Retrieved May, Vol. 1 (2017), 2021."},{"key":"e_1_3_2_1_23_1","volume-title":"Microsoft: Blue Hat conference. https:\/\/www.zdnet.com\/article\/microsoft-70-percent-of-all-security-bugs-are-memory-safety-issues\/","author":"Miller Matt","year":"2019","unstructured":"Matt Miller. 2019. Microsoft: Blue Hat conference. https:\/\/www.zdnet.com\/article\/microsoft-70-percent-of-all-security-bugs-are-memory-safety-issues\/"},{"key":"e_1_3_2_1_24_1","volume-title":"Nick Nikiforakis, and Michalis Polychronakis.","author":"Miramirkhani Najmeh","year":"2017","unstructured":"Najmeh Miramirkhani, Mahathi Priya Appini, Nick Nikiforakis, and Michalis Polychronakis. 2017. Spotless sandboxes: Evading malware analysis systems using wear-and-tear artifacts. In IEEE SP. 1009--1024."},{"key":"e_1_3_2_1_25_1","first-page":"1938","article-title":"A brief study of wannacry threat: Ransomware attack 2017","volume":"8","author":"Mohurle Savita","year":"2017","unstructured":"Savita Mohurle and Manisha Patil. 2017. A brief study of wannacry threat: Ransomware attack 2017. IJARCS, Vol. 8, 5 (2017), 1938--1940.","journal-title":"IJARCS"},{"key":"e_1_3_2_1_26_1","first-page":"462","article-title":"Deception methodology in virtual honeypots","volume":"2","author":"Qassrawi Mahmoud T","year":"2010","unstructured":"Mahmoud T Qassrawi and Zhang Hongli. 2010. Deception methodology in virtual honeypots. In IEEE NSWCTC, Vol. 2. 462--467.","journal-title":"IEEE NSWCTC"},{"key":"e_1_3_2_1_27_1","volume-title":"Workshops at the Thirty-Second AAAI Conference on Artificial Intelligence.","author":"Raff Edward","year":"2018","unstructured":"Edward Raff, Jon Barker, Jared Sylvester, Robert Brandon, Bryan Catanzaro, and Charles K Nicholas. 2018. Malware detection by eating a whole exe. In Workshops at the Thirty-Second AAAI Conference on Artificial Intelligence."},{"key":"e_1_3_2_1_28_1","volume-title":"Walter Diong, and Latifur Khan.","author":"Islam Sajid Md Sajidul","year":"2021","unstructured":"Md Sajidul Islam Sajid, Jinpeng Wei, Basel Abdeen, Ehab Al-Shaer, Md Mazharul Islam, Walter Diong, and Latifur Khan. 2021. Soda: A system for cyber deception orchestration and automation. In ACSAC. 675--689."},{"volume-title":"(State of) The Art of War: Offensive Techniques in Binary Analysis","author":"Shoshitaishvili Yan","key":"e_1_3_2_1_29_1","unstructured":"Yan Shoshitaishvili, Ruoyu Wang, Christopher Salls, Nick Stephens, Mario Polino, Audrey Dutcher, John Grosen, Siji Feng, Christophe Hauser, Christopher Kruegel, and Giovanni Vigna. 2016. SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis. In IEEE SP."},{"key":"e_1_3_2_1_30_1","unstructured":"Pedro Tavares. 2021. Redline stealer malware: Full analysis. https:\/\/resources.infosecinstitute.com\/topic\/redline-stealer-malware-full-analysis\/"},{"volume-title":"A small cache of large ranges: Hardware methods for efficiently searching, storing, and updating big dataflow tags","author":"Tiwari Mohit","key":"e_1_3_2_1_31_1","unstructured":"Mohit Tiwari, Banit Agrawal, Shashidhar Mysore, Jonathan Valamehr, and Timothy Sherwood. 2008. A small cache of large ranges: Hardware methods for efficiently searching, storing, and updating big dataflow tags. In IEEE\/ACM MICRO. 94--105."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076739"},{"key":"e_1_3_2_1_33_1","volume-title":"Camouflage: Memory traffic shaping to mitigate timing attacks","author":"Zhou Yanqi","year":"2017","unstructured":"Yanqi Zhou, Sameer Wagh, Prateek Mittal, and David Wentzlaff. 2017. Camouflage: Memory traffic shaping to mitigate timing attacks. In IEEE HPCA. 337--348."}],"event":{"name":"GLSVLSI '23: Great Lakes Symposium on VLSI 2023","sponsor":["SIGDA ACM Special Interest Group on Design Automation"],"location":"Knoxville TN USA","acronym":"GLSVLSI '23"},"container-title":["Proceedings of the Great Lakes Symposium on VLSI 2023"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3583781.3590272","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3583781.3590272","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3583781.3590272","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:37:05Z","timestamp":1750178225000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3583781.3590272"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,5]]},"references-count":33,"alternative-id":["10.1145\/3583781.3590272","10.1145\/3583781"],"URL":"https:\/\/doi.org\/10.1145\/3583781.3590272","relation":{},"subject":[],"published":{"date-parts":[[2023,6,5]]},"assertion":[{"value":"2023-06-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}