{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T10:08:21Z","timestamp":1764842901810,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T00:00:00Z","timestamp":1723507200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,8,13]]},"DOI":"10.1145\/3675741.3675743","type":"proceedings-article","created":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T16:34:45Z","timestamp":1722962085000},"page":"8-16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Accelerating Ransomware Defenses with Computational Storage Drive-Based API Call Sequence Classification"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-0883-6615","authenticated-orcid":false,"given":"Kurt","family":"Friday","sequence":"first","affiliation":[{"name":"Louisiana State University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8040-4635","authenticated-orcid":false,"given":"Elias","family":"Bou-Harb","sequence":"additional","affiliation":[{"name":"Louisiana State University, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,8,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n. d.]. Best of...https:\/\/www.portablefreeware.com\/bestof.php"},{"key":"e_1_3_2_1_2_1","volume-title":"IEEE International Conference on Computer Communications.","author":"Tanyi-Jong Akem Aristide","year":"2024","unstructured":"Aristide Tanyi-Jong Akem, Beyza B\u00fct\u00fcn, Michele Gucciardo, Marco Fiore, 2024. Jewel: Resource-efficient joint packet and flow level inference in programmable switches. In IEEE International Conference on Computer Communications."},{"key":"e_1_3_2_1_3_1","volume-title":"IEEE\/IFIP Network Operations and Management Symposium.","author":"Tanyi-Jong Akem Aristide","year":"2024","unstructured":"Aristide Tanyi-Jong Akem, Guillaume Fraysse, Marco Fiore, 2024. Encrypted Traffic Classification at Line Rate in Programmable Switches with Machine Learning. In IEEE\/IFIP Network Operations and Management Symposium."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM53939.2023.10229100"},{"key":"e_1_3_2_1_5_1","unstructured":"AMD. [n. d.]. Alveo U200 Data Center Accelerator Card. https:\/\/www.xilinx.com\/products\/boards-and-kits\/alveo\/u200.html"},{"key":"e_1_3_2_1_6_1","volume-title":"PreCog: Near-Storage Accelerator for Heterogeneous CNN Inference. In 2023 IEEE 34th International Conference on Application-specific Systems, Architectures and Processors (ASAP). IEEE, 45\u201352","author":"An Jiyoung","year":"2023","unstructured":"Jiyoung An, Esmerald Aliaj, and Sang-Woo Jun. 2023. PreCog: Near-Storage Accelerator for Heterogeneous CNN Inference. In 2023 IEEE 34th International Conference on Application-specific Systems, Architectures and Processors (ASAP). IEEE, 45\u201352."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.03.278"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of 10th International Workshop on Accelerating Analytics and Data Management Systems (ADMS\u201919)","author":"Chapman Keith","year":"2019","unstructured":"Keith Chapman, Mehdi Nik, Behnam Robatmili, Shahrzad Mirkhani, and Maysam Lavasani. 2019. Computational storage for big data analytics. In Proceedings of 10th International Workshop on Accelerating Analytics and Data Management Systems (ADMS\u201919)."},{"key":"e_1_3_2_1_9_1","unstructured":"Cuckoo. [n. d.]. Cuckoo Sandbox. https:\/\/cuckoo.cert.ee\/"},{"key":"e_1_3_2_1_10_1","volume-title":"Devices, Circuits and Systems","author":"Fakhry Dina","year":"2023","unstructured":"Dina Fakhry, Mohamed Abdelsalam, M\u00a0Watheq El-Kharashi, and Mona Safar. 2023. A review on computational storage devices and near memory computing for high performance applications. Memories-Materials, Devices, Circuits and Systems (2023), 100051."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3328351"},{"key":"e_1_3_2_1_12_1","volume-title":"On offloading network forensic analytics to programmable data plane switches","author":"Friday Kurt","year":"2021","unstructured":"Kurt Friday. 2021. On offloading network forensic analytics to programmable data plane switches. World ScientificNow Publishers series in business (2021)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-23020-2_7"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Kurt Friday Elias Bou-Harb Jorge Crichigno Mark Scanlon and Nicole Beebe. 2023. Offloading network forensic analytics to programmable data plane switches. In Innovations in Digital Forensics. World Scientific 139\u2013190.","DOI":"10.1142\/9789811273209_0005"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/NetSoft48620.2020.9165336"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-17140-6_27"},{"key":"e_1_3_2_1_17_1","first-page":"4","volume-title":"An exhaustive survey on","author":"Kfoury F","year":"2021","unstructured":"Elie\u00a0F Kfoury, Jorge Crichigno, and Elias Bou-Harb. 2021. An exhaustive survey on p4 programmable data plane switches: Taxonomy, applications, challenges, and future trends. IEEE access 9 (2021), 87094\u201387155."},{"key":"e_1_3_2_1_18_1","volume-title":"Redemption: Real-time protection against ransomware at end-hosts. In Research in Attacks, Intrusions, and Defenses: 20th International Symposium, RAID","author":"Kharraz Amin","year":"2017","unstructured":"Amin Kharraz and Engin Kirda. 2017. Redemption: Real-time protection against ransomware at end-hosts. In Research in Attacks, Intrusions, and Defenses: 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18\u201320, 2017, Proceedings. Springer, 98\u2013119."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2022.3155956"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3511213"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3558006"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3470496.3527391"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579371.3589093"},{"key":"e_1_3_2_1_24_1","volume-title":"Domain-specific computational storage for serverless computing. arXiv preprint arXiv:2303.03483","author":"Mahapatra Rohan","year":"2023","unstructured":"Rohan Mahapatra, Soroush Ghodrati, Byung\u00a0Hoon Ahn, Sean Kinzer, Shu-ting Wang, Hanyang Xu, Lavanya Karthikeyan, Hardik Sharma, Amir Yazdanbakhsh, Mohammad Alian, 2023. Domain-specific computational storage for serverless computing. arXiv preprint arXiv:2303.03483 (2023)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3620665.3640413"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307650.3322275"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2021.3099084"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3453153"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2018.00058"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3599691.3603404"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM51124.2021.00020"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-6890-6_13"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3268535"},{"volume-title":"Leveraging PISA Switches for Traffic-Aware in Network Load Balancing in Data Center Networks","author":"Robin O\u00a0DAS","key":"e_1_3_2_1_34_1","unstructured":"DEBOBROTO\u00a0DAS Robin. 2023. Leveraging PISA Switches for Traffic-Aware in Network Load Balancing in Data Center Networks. Kent State University."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3142106"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109210"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2018.04.004"},{"key":"e_1_3_2_1_38_1","unstructured":"Mark Russinovich. 2024. Process Monitor - Sysinternals. https:\/\/learn.microsoft.com\/en-us\/sysinternals\/downloads\/procmon"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3431920.3439298"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3472769"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM51124.2021.00052"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2022.3147743"},{"key":"e_1_3_2_1_43_1","unstructured":"Xilinx. [n. d.]. Vitis Unified Software Platform. https:\/\/www.xilinx.com\/products\/design-tools\/vitis.html"},{"key":"e_1_3_2_1_44_1","volume-title":"Poseidon-NDP: Practical Fully Homomorphic Encryption Accelerator Based on Near Data Processing Architecture","author":"Yang Yinghao","year":"2023","unstructured":"Yinghao Yang, Hang Lu, and Xiaowei Li. 2023. Poseidon-NDP: Practical Fully Homomorphic Encryption Accelerator Based on Near Data Processing Architecture. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (2023)."},{"key":"e_1_3_2_1_45_1","volume-title":"21st USENIX Conference on File and Storage Technologies (FAST 23)","author":"Yang Zhe","year":"2023","unstructured":"Zhe Yang, Youyou Lu, Xiaojian Liao, Youmin Chen, Junru Li, Siyu He, and Jiwu Shu. 2023. {\u03bb -IO} : A Unified { IO} Stack for Computational Storage. In 21st USENIX Conference on File and Storage Technologies (FAST 23). 347\u2013362."}],"event":{"name":"CSET 2024: Workshop on Cyber Security Experimentation and Test","acronym":"CSET 2024","location":"Philadelphia PA USA"},"container-title":["Proceedings of the 17th Cyber Security Experimentation and Test Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3675741.3675743","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3675741.3675743","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:04:09Z","timestamp":1750291449000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3675741.3675743"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,13]]},"references-count":45,"alternative-id":["10.1145\/3675741.3675743","10.1145\/3675741"],"URL":"https:\/\/doi.org\/10.1145\/3675741.3675743","relation":{},"subject":[],"published":{"date-parts":[[2024,8,13]]},"assertion":[{"value":"2024-08-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}