{"id":"https://openalex.org/W4321195913","doi":"https://doi.org/10.1109/tdsc.2023.3246170","title":"Towards Unveiling Exploitation Potential With Multiple Error Behaviors for Kernel Bugs","display_name":"Towards Unveiling Exploitation Potential With Multiple Error Behaviors for Kernel Bugs","publication_year":2023,"publication_date":"2023-02-17","ids":{"openalex":"https://openalex.org/W4321195913","doi":"https://doi.org/10.1109/tdsc.2023.3246170"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2023.3246170","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2023.3246170","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102913730","display_name":"Ziqin Liu","orcid":"https://orcid.org/0000-0003-3310-4861"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ziqin Liu","raw_affiliation_strings":["Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051548030","display_name":"Zhenpeng Lin","orcid":"https://orcid.org/0000-0003-3593-4615"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zhenpeng Lin","raw_affiliation_strings":["College of Information Sciences and Technology, The Pennsylvania State University, State College, PA, USA","College of Information Sciences and Technology, Pennsylvania State University, Pennsylvania, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Information Sciences and Technology, The Pennsylvania State University, State College, PA, USA","institution_ids":["https://openalex.org/I130769515"]},{"raw_affiliation_string":"College of Information Sciences and Technology, Pennsylvania State University, Pennsylvania, USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041827624","display_name":"Yueqi Chen","orcid":"https://orcid.org/0000-0001-6975-2874"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yueqi Chen","raw_affiliation_strings":["College of Information Sciences and Technology, The Pennsylvania State University, State College, PA, USA","College of Information Sciences and Technology, Pennsylvania State University, Pennsylvania, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Information Sciences and Technology, The Pennsylvania State University, State College, PA, USA","institution_ids":["https://openalex.org/I130769515"]},{"raw_affiliation_string":"College of Information Sciences and Technology, Pennsylvania State University, Pennsylvania, USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081197053","display_name":"Yuhang Wu","orcid":"https://orcid.org/0000-0002-0641-9107"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yuhang Wu","raw_affiliation_strings":["College of Information Sciences and Technology, The Pennsylvania State University, State College, PA, USA","College of Information Sciences and Technology, Pennsylvania State University, Pennsylvania, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Information Sciences and Technology, The Pennsylvania State University, State College, PA, USA","institution_ids":["https://openalex.org/I130769515"]},{"raw_affiliation_string":"College of Information Sciences and Technology, Pennsylvania State University, Pennsylvania, USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021288682","display_name":"Yalong Zou","orcid":null},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yalong Zou","raw_affiliation_strings":["Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101637815","display_name":"Dongliang Mu","orcid":"https://orcid.org/0000-0001-8042-8928"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dongliang Mu","raw_affiliation_strings":["Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"],"raw_orcid":"https://orcid.org/0000-0001-8042-8928","affiliations":[{"raw_affiliation_string":"Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041094652","display_name":"Xinyu Xing","orcid":"https://orcid.org/0000-0001-6733-226X"},"institutions":[{"id":"https://openalex.org/I111979921","display_name":"Northwestern University","ror":"https://ror.org/000e0be47","country_code":"US","type":"education","lineage":["https://openalex.org/I111979921"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xinyu Xing","raw_affiliation_strings":["Department of Computer Sciences, Northwestern University, Evanston, IL, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Sciences, Northwestern University, Evanston, IL, USA","institution_ids":["https://openalex.org/I111979921"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5102913730"],"corresponding_institution_ids":["https://openalex.org/I47720641"],"apc_list":null,"apc_paid":null,"fwci":0.787,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.71561367,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"21","issue":"1","first_page":"93","last_page":"109"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9905999898910522,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.9651433229446411},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7908039093017578},{"id":"https://openalex.org/keywords/kernel","display_name":"Kernel (algebra)","score":0.7257987856864929},{"id":"https://openalex.org/keywords/software-bug","display_name":"Software bug","score":0.667375922203064},{"id":"https://openalex.org/keywords/linux-kernel","display_name":"Linux kernel","score":0.579494059085846},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5309231877326965},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5069332718849182},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.46211865544319153},{"id":"https://openalex.org/keywords/empirical-research","display_name":"Empirical research","score":0.442543089389801},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3451319932937622},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3317122757434845},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.2593446969985962},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.1872439682483673},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1680082380771637},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08810737729072571}],"concepts":[{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.9651433229446411},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7908039093017578},{"id":"https://openalex.org/C74193536","wikidata":"https://www.wikidata.org/wiki/Q574844","display_name":"Kernel (algebra)","level":2,"score":0.7257987856864929},{"id":"https://openalex.org/C1009929","wikidata":"https://www.wikidata.org/wiki/Q179550","display_name":"Software bug","level":3,"score":0.667375922203064},{"id":"https://openalex.org/C553261973","wikidata":"https://www.wikidata.org/wiki/Q14579","display_name":"Linux kernel","level":2,"score":0.579494059085846},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5309231877326965},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5069332718849182},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.46211865544319153},{"id":"https://openalex.org/C120936955","wikidata":"https://www.wikidata.org/wiki/Q2155640","display_name":"Empirical research","level":2,"score":0.442543089389801},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3451319932937622},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3317122757434845},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.2593446969985962},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.1872439682483673},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1680082380771637},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08810737729072571},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2023.3246170","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2023.3246170","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5299999713897705}],"awards":[{"id":"https://openalex.org/G7980662148","display_name":null,"funder_award_id":"62102154","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W2066636486","https://openalex.org/W2094619820","https://openalex.org/W2151725765","https://openalex.org/W2575425722","https://openalex.org/W2612397603","https://openalex.org/W2612883158","https://openalex.org/W2613274303","https://openalex.org/W2765435026","https://openalex.org/W2766411424","https://openalex.org/W2766711930","https://openalex.org/W2766898821","https://openalex.org/W2927543040","https://openalex.org/W2947814692","https://openalex.org/W2985831349","https://openalex.org/W2987375469","https://openalex.org/W3007127028","https://openalex.org/W3015513242","https://openalex.org/W3016185124","https://openalex.org/W3108020564","https://openalex.org/W3108766814","https://openalex.org/W3207470659","https://openalex.org/W4206165574","https://openalex.org/W4288057707","https://openalex.org/W6628569256","https://openalex.org/W6743674107","https://openalex.org/W6754182100","https://openalex.org/W6754293714","https://openalex.org/W6754597693","https://openalex.org/W6766193004","https://openalex.org/W6778459099","https://openalex.org/W6781274470","https://openalex.org/W6781362174","https://openalex.org/W6781991847","https://openalex.org/W6781997156"],"related_works":["https://openalex.org/W3113028789","https://openalex.org/W2924291353","https://openalex.org/W614438062","https://openalex.org/W2966992680","https://openalex.org/W4288057707","https://openalex.org/W2999227841","https://openalex.org/W3173990398","https://openalex.org/W2016562931","https://openalex.org/W4205454537","https://openalex.org/W3006186133"],"abstract_inverted_index":{"Nowadays,":[0],"fuzz":[1],"testing":[2],"has":[3,289],"significantly":[4],"expedited":[5],"the":[6,15,21,29,39,45,48,80,87,95,99,115,145,154,186,193,217,254,275,278,286],"vulnerability":[7],"discovery":[8],"of":[9,23,47,74,82,90,156,169,219,253,274,280],"Linux":[10,162,237],"kernel.":[11],"Security":[12],"analysts":[13,42],"use":[14],"manifested":[16,138],"error":[17,36,56,72,84,92,104,136,150,188,206,249],"behaviors":[18,57,73,85,93,105,137,151,207,250],"to":[19,77,125,165,185,202,234,270],"infer":[20],"exploitability":[22,46,155,279],"one":[24],"bug":[25,50,130,171,174,211],"and":[26,86,148,179,231,285],"thus":[27],"prioritize":[28],"patch":[30,288,300],"development.":[31],"However,":[32],"only":[33],"using":[34],"an":[35,67,198],"behavior":[37],"in":[38,144,297],"report,":[40],"security":[41],"might":[43,212],"underestimate":[44],"kernel":[49,75,117,140,157,163,170,210,238,255,259,271],"because":[51],"it":[52,233],"could":[53,245],"manifest":[54,102,246],"various":[55],"indicating":[58],"different":[59,107],"exploitation":[60,96,108,266],"potentials.":[61],"In":[62],"this":[63],"work,":[64],"we":[65,160,196,223],"conduct":[66],"empirical":[68,194],"study":[69],"on":[70,120,192],"multiple":[71,83,91,103,135],"bugs":[76,141,276],"understand":[78],"1)":[79],"prevalence":[81],"possible":[88,205],"impact":[89],"towards":[94],"potential;":[97],"2)":[98],"factors":[100,184],"that":[101,134,208],"with":[106],"potential.":[109,267],"We":[110,132,268],"collected":[111],"<italic":[112],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[113,229,243,262],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">all":[114],"fixed":[116],"bugs</i>":[118],"reported":[119],"Syzbot":[121],"from":[122],"September":[123],"2017":[124],"January":[126],"2022,":[127],"including":[128],"3,352":[129],"reports.":[131],"observed":[133],"by":[139],"are":[142],"prevalent":[143],"real":[146],"world,":[147],"more":[149],"help":[152],"unveil":[153],"bugs.":[158,239,256],"Then":[159],"organized":[161],"experts":[164],"analyze":[166],"a":[167,209],"sample":[168],"dataset":[172],"(484":[173],"reports,":[175],"unique":[176],"162":[177],"bugs)":[178],"identified":[180],"6":[181],"key":[182],"contributing":[183],"mutiple":[187],"behaviors.":[189],"Finally,":[190],"based":[191],"findings,":[195],"propose":[197],"object-driven":[199],"fuzzing":[200,226],"technique":[201],"explore":[203],"all":[204],"bring":[213],"about.":[214],"To":[215],"evaluate":[216],"utility":[218],"our":[220,225],"proposed":[221],"technique,":[222],"implement":[224],"tool":[227],"<monospace":[228,242,261],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">GREBE</monospace>":[230,244,263],"apply":[232],"60":[235],"real-world":[236],"On":[240],"average,":[241],"2+":[247],"additional":[248],"for":[251],"each":[252],"For":[257],"26":[258],"bugs,":[260],"discovers":[264],"higher":[265],"report":[269],"vendors":[272],"some":[273],"\u2013":[277,295],"which":[281],"was":[282],"wrongly":[283],"assessed":[284],"corresponding":[287],"not":[290],"yet":[291],"been":[292],"carefully":[293],"applied":[294],"resulting":[296],"their":[298],"rapid":[299],"adoption.":[301]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
