{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T06:24:58Z","timestamp":1762410298752,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,6,12]],"date-time":"2024-06-12T00:00:00Z","timestamp":1718150400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-21-1-2520"],"award-info":[{"award-number":["N00014-21-1-2520"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,12]]},"DOI":"10.1145\/3649476.3658749","type":"proceedings-article","created":{"date-parts":[[2024,6,10]],"date-time":"2024-06-10T12:29:41Z","timestamp":1718022581000},"page":"409-414","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["EPIC: Efficient and Proactive Instruction-level Cyberdefense"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2177-393X","authenticated-orcid":false,"given":"Preet","family":"Derasari","sequence":"first","affiliation":[{"name":"Electrical and Computer Engineering, George Washington University, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7084-7560","authenticated-orcid":false,"given":"Guru","family":"Venkataramani","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering, George Washington University, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2024,6,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609960"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Frederico Araujo Kevin\u00a0W Hamlen Sebastian Biedermann and Stefan Katzenbeisser. 2014. From patches to honey-patches: Lightweight attacker misdirection deception and disinformation. In ACM CCS\u201914. 942\u2013953.","DOI":"10.1145\/2660267.2660329"},{"key":"e_1_3_2_1_3_1","volume-title":"Cyborg: An autonomous cyber operations research gym. arXiv preprint arXiv:2002.10667","author":"Baillie Callum","year":"2020","unstructured":"Callum Baillie, Maxwell Standen, Jonathon Schwartz, Michael Docking, David Bowman, and Junae Kim. 2020. Cyborg: An autonomous cyber operations research gym. arXiv preprint arXiv:2002.10667 (2020)."},{"key":"e_1_3_2_1_4_1","volume-title":"The gem5 simulator. ACM SIGARCH computer architecture news 39, 2","author":"Binkert Nathan","year":"2011","unstructured":"Nathan Binkert, Bradford Beckmann, Gabriel Black, Steven\u00a0K. Reinhardt, Ali Saidi, Arkaprava Basu, Joel Hestness, Derek\u00a0R. Hower, Tushar Krishna, Somayeh Sardashti, Rathijit Sen, Korey Sewell, Muhammad Shoaib, Nilay Vaish, Mark\u00a0D. Hill, and David\u00a0A. Wood. 2011. The gem5 simulator. ACM SIGARCH computer architecture news 39, 2 (2011), 1\u20137."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3185768.3185771"},{"key":"e_1_3_2_1_6_1","unstructured":"Nicholas Carlini and David Wagner. 2014. { ROP} is still dangerous: Breaking modern defenses. In USENIX Security 14. 385\u2013399."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2963791"},{"key":"e_1_3_2_1_8_1","volume-title":"Camouflage: Hardware-assisted cfi for the arm linux kernel","author":"Denis-Courmont R\u00e9mi","year":"2020","unstructured":"R\u00e9mi Denis-Courmont, Hans Liljestrand, Carlos Chinea, and Jan-Erik Ekberg. 2020. Camouflage: Hardware-assisted cfi for the arm linux kernel. In ACM\/IEEE DAC\u201920. 1\u20136."},{"key":"e_1_3_2_1_9_1","volume-title":"Mayalok: A Cyber-Deception Hardware Using Runtime Instruction Infusion. In 34th IEEE ASAP\u201923. 33\u201340.","author":"Derasari Preet","year":"2023","unstructured":"Preet Derasari, Kailash Gogineni, and Guru Venkataramani. 2023. Mayalok: A Cyber-Deception Hardware Using Runtime Instruction Infusion. In 34th IEEE ASAP\u201923. 33\u201340."},{"key":"e_1_3_2_1_10_1","volume-title":"MAYAVI: A Cyber-Deception Hardware for Memory Load-Stores. In 33rd ACM GLSVLSI\u201923. 563\u2013568.","author":"Derasari Preet","year":"2023","unstructured":"Preet Derasari, Kailash Gogineni, and Guru Venkataramani. 2023. MAYAVI: A Cyber-Deception Hardware for Memory Load-Stores. In 33rd ACM GLSVLSI\u201923. 563\u2013568."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1353535.1346295"},{"volume-title":"SHORE: hardware\/software method for memory safety acceleration on RISC-V","author":"Dow Hsu-Kang","key":"e_1_3_2_1_12_1","unstructured":"Hsu-Kang Dow, Tuo Li, William Miles, and Sri Parameswaran. 2021. SHORE: hardware\/software method for memory safety acceleration on RISC-V. In ACM\/IEEE DAC\u201921. 289\u2013294."},{"key":"e_1_3_2_1_13_1","unstructured":"Chris Eagle. 2011. The IDA pro book. no starch press."},{"key":"e_1_3_2_1_14_1","volume-title":"Zhixing Xu","author":"Gallagher Mark","year":"2019","unstructured":"Mark Gallagher, Lauren Biernacki, Shibo Chen, Zelalem\u00a0Birhanu Aweke, Salessawi\u00a0Ferede Yitbarek, Misiker\u00a0Tadesse Aga, Austin Harris, Zhixing Xu, Baris Kasikci, Valeria Bertacco, 2019. Morpheus: A vulnerability-tolerant secure architecture based on ensembles of moving target defenses with churn. In ACM ASPLOS\u201919. 469\u2013484."},{"key":"e_1_3_2_1_15_1","volume-title":"Foreseer: Efficiently Forecasting Malware Event Series with Long Short-Term Memory","author":"Gogineni Kailash","year":"2022","unstructured":"Kailash Gogineni, Preet Derasari, and Guru Venkataramani. 2022. Foreseer: Efficiently Forecasting Malware Event Series with Long Short-Term Memory. In IEEE SEED\u201922. 97\u2013108."},{"volume-title":"PwIN\u2013Pwning Intel piN: Why DBI is unsuitable for security applications","author":"Kirsch Julian","key":"e_1_3_2_1_16_1","unstructured":"Julian Kirsch, Zhechko Zhechev, Bruno Bierbaumer, and Thomas Kittel. 2018. PwIN\u2013Pwning Intel piN: Why DBI is unsuitable for security applications. In Springer ESORICS\u201918. 363\u2013382."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Santosh Nagarakatte Jianzhou Zhao Milo\u00a0MK Martin and Steve Zdancewic. 2009. SoftBound: Highly compatible and complete spatial memory safety for C. In ACM PLDI\u201909. 245\u2013258.","DOI":"10.1145\/1542476.1542504"},{"volume-title":"Identifying valuable pointers in heap data","author":"Roney James","key":"e_1_3_2_1_19_1","unstructured":"James Roney, Troy Appel, Prateek Pinisetti, and James Mickens. 2021. Identifying valuable pointers in heap data. In IEEE SPW\u201921. 373\u2013382."},{"volume-title":"(State of) The Art of War: Offensive Techniques in Binary Analysis","author":"Shoshitaishvili Yan","key":"e_1_3_2_1_20_1","unstructured":"Yan Shoshitaishvili, Ruoyu Wang, Christopher Salls, Nick Stephens, Mario Polino, Audrey Dutcher, John Grosen, Siji Feng, Christophe Hauser, Christopher Kruegel, and Giovanni Vigna. 2016. SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis. In IEEE S&P\u201916. 138\u2013157."},{"key":"e_1_3_2_1_21_1","volume-title":"Sok: Eternal war in memory","author":"Szekeres Laszlo","year":"2013","unstructured":"Laszlo Szekeres, Mathias Payer, Tao Wei, and Dawn Song. 2013. Sok: Eternal war in memory. In IEEE S&P\u201913. 48\u201362."},{"key":"e_1_3_2_1_22_1","unstructured":"CWE\u00a0Content Team. 2023. CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer. https:\/\/cwe.mitre.org\/data\/definitions\/119.html"},{"key":"e_1_3_2_1_23_1","first-page":"80","article-title":"Cyber deception: Overview and the road ahead","volume":"16","author":"Wang C.","year":"2018","unstructured":"C. Wang and Z. Lu. 2018. Cyber deception: Overview and the road ahead. IEEE S&P 16, 2 (2018), 80\u201385.","journal-title":"IEEE S&P"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076739"},{"key":"e_1_3_2_1_25_1","volume-title":"Simber: Eliminating redundant memory bound checks via statistical inference","author":"Xue Hongfa","year":"2017","unstructured":"Hongfa Xue, Yurong Chen, Fan Yao, Yongbo Li, Tian Lan, and Guru Venkataramani. 2017. Simber: Eliminating redundant memory bound checks via statistical inference. In Springer IFIP, SEC\u201917. 413\u2013426."}],"event":{"name":"GLSVLSI '24: Great Lakes Symposium on VLSI 2024","sponsor":["SIGDA ACM Special Interest Group on Design Automation"],"location":"Clearwater FL USA","acronym":"GLSVLSI '24"},"container-title":["Proceedings of the Great Lakes Symposium on VLSI 2024"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3649476.3658749","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3649476.3658749","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T02:32:47Z","timestamp":1755829967000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3649476.3658749"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,12]]},"references-count":25,"alternative-id":["10.1145\/3649476.3658749","10.1145\/3649476"],"URL":"https:\/\/doi.org\/10.1145\/3649476.3658749","relation":{},"subject":[],"published":{"date-parts":[[2024,6,12]]},"assertion":[{"value":"2024-06-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}