{"id":"https://openalex.org/W2327395261","doi":"https://doi.org/10.1145/2897795.2897805","title":"Double Helix and RAVEN","display_name":"Double Helix and RAVEN","publication_year":2016,"publication_date":"2016-04-05","ids":{"openalex":"https://openalex.org/W2327395261","doi":"https://doi.org/10.1145/2897795.2897805","mag":"2327395261"},"language":"en","primary_location":{"id":"doi:10.1145/2897795.2897805","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2897795.2897805","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th Annual Cyber and Information Security Research Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003389724","display_name":"Michele Co","orcid":null},"institutions":[{"id":"https://openalex.org/I51556381","display_name":"University of Virginia","ror":"https://ror.org/0153tk833","country_code":"US","type":"education","lineage":["https://openalex.org/I51556381"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Michele Co","raw_affiliation_strings":["Department of Computer Science, University of Virginia, Charlottesville, VA 22904"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Virginia, Charlottesville, VA 22904","institution_ids":["https://openalex.org/I51556381"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068264173","display_name":"Jack W. Davidson","orcid":null},"institutions":[{"id":"https://openalex.org/I51556381","display_name":"University of Virginia","ror":"https://ror.org/0153tk833","country_code":"US","type":"education","lineage":["https://openalex.org/I51556381"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jack W. Davidson","raw_affiliation_strings":["Department of Computer Science, University of Virginia, Charlottesville, VA 22904"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Virginia, Charlottesville, VA 22904","institution_ids":["https://openalex.org/I51556381"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086514103","display_name":"Jason D. Hiser","orcid":null},"institutions":[{"id":"https://openalex.org/I51556381","display_name":"University of Virginia","ror":"https://ror.org/0153tk833","country_code":"US","type":"education","lineage":["https://openalex.org/I51556381"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jason D. Hiser","raw_affiliation_strings":["Department of Computer Science, University of Virginia, Charlottesville, VA 22904"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Virginia, Charlottesville, VA 22904","institution_ids":["https://openalex.org/I51556381"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075482777","display_name":"John Knight","orcid":"https://orcid.org/0000-0003-4327-7272"},"institutions":[{"id":"https://openalex.org/I51556381","display_name":"University of Virginia","ror":"https://ror.org/0153tk833","country_code":"US","type":"education","lineage":["https://openalex.org/I51556381"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"John C. Knight","raw_affiliation_strings":["Department of Computer Science, University of Virginia, Charlottesville, VA 22904"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Virginia, Charlottesville, VA 22904","institution_ids":["https://openalex.org/I51556381"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067640908","display_name":"Anh Nguyen\u2010Tuong","orcid":null},"institutions":[{"id":"https://openalex.org/I51556381","display_name":"University of Virginia","ror":"https://ror.org/0153tk833","country_code":"US","type":"education","lineage":["https://openalex.org/I51556381"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Anh Nguyen-Tuong","raw_affiliation_strings":["Department of Computer Science, University of Virginia, Charlottesville, VA 22904"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Virginia, Charlottesville, VA 22904","institution_ids":["https://openalex.org/I51556381"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083601969","display_name":"Westley Weimer","orcid":"https://orcid.org/0000-0001-6749-2204"},"institutions":[{"id":"https://openalex.org/I51556381","display_name":"University of Virginia","ror":"https://ror.org/0153tk833","country_code":"US","type":"education","lineage":["https://openalex.org/I51556381"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Westley Weimer","raw_affiliation_strings":["Department of Computer Science, University of Virginia, Charlottesville, VA 22904"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Virginia, Charlottesville, VA 22904","institution_ids":["https://openalex.org/I51556381"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052571448","display_name":"Jonathan Burket","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jonathan Burket","raw_affiliation_strings":["Apogee Research, 4075 Wilson, Blvd, Arlington, VA 22203"],"affiliations":[{"raw_affiliation_string":"Apogee Research, 4075 Wilson, Blvd, Arlington, VA 22203","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038115834","display_name":"Gregory Frazier","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Gregory L. Frazier","raw_affiliation_strings":["Apogee Research, 4075 Wilson, Blvd, Arlington, VA 22203"],"affiliations":[{"raw_affiliation_string":"Apogee Research, 4075 Wilson, Blvd, Arlington, VA 22203","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113488190","display_name":"Tiffany M. Frazier","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Tiffany M. Frazier","raw_affiliation_strings":["Apogee Research, 4075 Wilson, Blvd, Arlington, VA 22203"],"affiliations":[{"raw_affiliation_string":"Apogee Research, 4075 Wilson, Blvd, Arlington, VA 22203","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003870034","display_name":"Bruno Dutertre","orcid":"https://orcid.org/0000-0002-6284-380X"},"institutions":[{"id":"https://openalex.org/I1298353152","display_name":"SRI International","ror":"https://ror.org/05s570m15","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I1298353152"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Bruno Dutertre","raw_affiliation_strings":["SRI International, Computer Science Laboratory, 333 Ravenswood Avenue, Menlo Park, CA, 94025"],"affiliations":[{"raw_affiliation_string":"SRI International, Computer Science Laboratory, 333 Ravenswood Avenue, Menlo Park, CA, 94025","institution_ids":["https://openalex.org/I1298353152"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111854002","display_name":"Ian Mason","orcid":null},"institutions":[{"id":"https://openalex.org/I1298353152","display_name":"SRI International","ror":"https://ror.org/05s570m15","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I1298353152"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ian Mason","raw_affiliation_strings":["SRI International, Computer Science Laboratory, 333 Ravenswood Avenue, Menlo Park, CA, 94025"],"affiliations":[{"raw_affiliation_string":"SRI International, Computer Science Laboratory, 333 Ravenswood Avenue, Menlo Park, CA, 94025","institution_ids":["https://openalex.org/I1298353152"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103207172","display_name":"Natarajan Shankar","orcid":"https://orcid.org/0000-0002-8652-8871"},"institutions":[{"id":"https://openalex.org/I1298353152","display_name":"SRI International","ror":"https://ror.org/05s570m15","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I1298353152"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Natarajan Shankar","raw_affiliation_strings":["SRI International, Computer Science Laboratory, 333 Ravenswood Avenue, Menlo Park, CA, 94025"],"affiliations":[{"raw_affiliation_string":"SRI International, Computer Science Laboratory, 333 Ravenswood Avenue, Menlo Park, CA, 94025","institution_ids":["https://openalex.org/I1298353152"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5114376382","display_name":"Stephanie Forrest","orcid":"https://orcid.org/0000-0002-5904-1646"},"institutions":[{"id":"https://openalex.org/I169521973","display_name":"University of New Mexico","ror":"https://ror.org/05fs6jp91","country_code":"US","type":"education","lineage":["https://openalex.org/I169521973"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Stephanie Forrest","raw_affiliation_strings":["Department of Computer Science, University of New Mexico, Albuquerque, NM, 87131"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of New Mexico, Albuquerque, NM, 87131","institution_ids":["https://openalex.org/I169521973"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":13,"corresponding_author_ids":["https://openalex.org/A5003389724"],"corresponding_institution_ids":["https://openalex.org/I51556381"],"apc_list":null,"apc_paid":null,"fwci":2.5708,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.91517629,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11005","display_name":"Radiation Effects in Electronics","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7897487878799438},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.6277497410774231},{"id":"https://openalex.org/keywords/rewriting","display_name":"Rewriting","score":0.5516442656517029},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4949116110801697},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.47578608989715576},{"id":"https://openalex.org/keywords/heap","display_name":"Heap (data structure)","score":0.4196763038635254},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.3717774450778961},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.35246098041534424},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2775789499282837},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.1952042579650879}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7897487878799438},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.6277497410774231},{"id":"https://openalex.org/C154690210","wikidata":"https://www.wikidata.org/wiki/Q1668499","display_name":"Rewriting","level":2,"score":0.5516442656517029},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4949116110801697},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.47578608989715576},{"id":"https://openalex.org/C134757568","wikidata":"https://www.wikidata.org/wiki/Q274089","display_name":"Heap (data structure)","level":2,"score":0.4196763038635254},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3717774450778961},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.35246098041534424},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2775789499282837},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.1952042579650879},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2897795.2897805","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2897795.2897805","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th Annual Cyber and Information Security Research Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W175875611","https://openalex.org/W1504083933","https://openalex.org/W1605940800","https://openalex.org/W1655226010","https://openalex.org/W1977336977","https://openalex.org/W2065870474","https://openalex.org/W2098010707","https://openalex.org/W2102902405","https://openalex.org/W2108860402","https://openalex.org/W2119055825","https://openalex.org/W2132806808","https://openalex.org/W2136286495","https://openalex.org/W2145373440","https://openalex.org/W2156375130","https://openalex.org/W2162800072","https://openalex.org/W2171143790","https://openalex.org/W2293825325","https://openalex.org/W4250206013","https://openalex.org/W6676006331"],"related_works":["https://openalex.org/W3158777280","https://openalex.org/W2120204135","https://openalex.org/W2139396251","https://openalex.org/W1796293478","https://openalex.org/W1577544887","https://openalex.org/W2168276503","https://openalex.org/W1573537275","https://openalex.org/W2105713543","https://openalex.org/W174435416","https://openalex.org/W2132239740"],"abstract_inverted_index":{"Cyber":[0],"security":[1,72,176],"research":[2,76],"has":[3,48],"produced":[4],"numerous":[5],"artificial":[6,83],"diversity":[7,84],"techniques":[8,28,173],"such":[9],"as":[10],"address":[11],"space":[12],"layout":[13],"randomization,":[14,16,18],"heap":[15],"instruction-set":[17],"and":[19,33,69,91,107,113,140,156,161,196],"instruction":[20],"location":[21],"randomization.":[22],"To":[23,60],"be":[24,30],"most":[25],"effective,":[26],"these":[27,58,94],"must":[29],"high":[31],"entropy":[32],"secure":[34],"from":[35],"information":[36,67],"leakage":[37],"which,":[38],"in":[39,105],"practice,":[40],"is":[41,123,190],"often":[42,56],"difficult":[43],"to":[44,85,111,125,165,174],"achieve.":[45],"Indeed,":[46],"it":[47,122],"been":[49],"demonstrated":[50],"that":[51,101,127,148,187],"well-funded,":[52],"determined":[53],"adversaries":[54],"can":[55],"circumvent":[57],"defenses.":[59],"allow":[61,170],"use":[62],"of":[63,88,130,142,178,192],"low-entropy":[64,79],"diversity,":[65],"prevent":[66],"leakage,":[68],"provide":[70],"provable":[71],"against":[73],"attacks,":[74],"previous":[75],"proposed":[77],"using":[78],"but":[80],"carefully":[81,120],"structured":[82,167],"create":[86],"variants":[87,96,118,168],"an":[89,138],"application":[90],"then":[92],"run":[93],"constructed":[95],"within":[97],"a":[98,143,150],"fault-tolerant":[99],"environment":[100,155],"runs":[102],"each":[103],"variant":[104],"parallel":[106],"cross":[108],"check":[109],"results":[110,182],"detect":[112],"mitigate":[114],"faults.":[115],"If":[116],"the":[117,179,188],"are":[119,132,183],"constructed,":[121],"possible":[124],"prove":[126,175],"certain":[128],"classes":[129],"attack":[131],"not":[133],"possible.":[134],"This":[135],"paper":[136],"presents":[137],"overview":[139],"status":[141],"cyber":[144],"fault":[145],"tolerant":[146],"system":[147,189],"uses":[149],"low":[151],"overhead":[152],"multi-variant":[153],"execution":[154],"precise":[157],"static":[158],"binary":[159],"analysis":[160],"efficient":[162],"rewriting":[163],"technology":[164],"produce":[166],"which":[169,185],"automated":[171],"verification":[172],"properties":[177],"system.":[180],"Preliminary":[181],"presented":[184],"demonstrate":[186],"capable":[191],"detecting":[193],"unknown":[194],"faults":[195],"mitigating":[197],"attacks.":[198]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
