{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T21:21:07Z","timestamp":1740172867882,"version":"3.37.3"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,4,4]],"date-time":"2021-04-04T00:00:00Z","timestamp":1617494400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,4,4]],"date-time":"2021-04-04T00:00:00Z","timestamp":1617494400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1007\/s11416-021-00379-x","type":"journal-article","created":{"date-parts":[[2021,4,4]],"date-time":"2021-04-04T18:13:51Z","timestamp":1617560031000},"page":"265-278","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Understanding Linux kernel vulnerabilities"],"prefix":"10.1007","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6250-8577","authenticated-orcid":false,"given":"Alireza","family":"Shameli-Sendi","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,4]]},"reference":[{"key":"379_CR1","doi-asserted-by":"crossref","unstructured":"Wang, P., Krinke, J., Lu, K., Li, G., Dodier-Lazaro, S.: How double-fetch situations turn into double-fetch vulnerabilities: a study of double fetches in the Linux kernel. In: InUSENIX Security Symposium, 2017 Aug 16","DOI":"10.1002\/cpe.4345"},{"key":"379_CR2","doi-asserted-by":"crossref","unstructured":"Xu, W., Li, J., Shu, J., Yang, W., Xie, T., Zhang, Y., Gu, D.: From collision to exploitation: unleashing use-after-free vulnerabilities in linux kernel. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 414\u2013425. ACM (2015)","DOI":"10.1145\/2810103.2813637"},{"key":"379_CR3","doi-asserted-by":"crossref","unstructured":"Gens, D., Schmitt, S., Davi, L., Sadeghi, AR.: K-miner: Uncovering memory corruption in linux. In: Proceedings of the 2018 Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA (2018)","DOI":"10.14722\/ndss.2018.23326"},{"issue":"3","key":"379_CR4","doi-asserted-by":"publisher","first-page":"1519","DOI":"10.1007\/s10664-017-9551-z","volume":"23","author":"M Bagherzadeh","year":"2018","unstructured":"Bagherzadeh, M., Kahani, N., Bezemer, C.P., Hassan, A.E., Dingel, J., Cordy, J.R.: Analyzing a decade of Linux system calls. Empir. Softw. Eng. 23(3), 1519\u201351 (2018)","journal-title":"Empir. Softw. Eng."},{"key":"379_CR5","unstructured":"National Vulnerability Database. http:\/\/nvd.nist.gov"},{"issue":"60","key":"379_CR6","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.jnca.2015.11.016","volume":"1","author":"M Ahmed","year":"2016","unstructured":"Ahmed, M., Mahmood, A.N., Hu, J.: A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 1(60), 19\u201331 (2016)","journal-title":"J. Netw. Comput. Appl."},{"issue":"4","key":"379_CR7","doi-asserted-by":"publisher","first-page":"2164","DOI":"10.1016\/j.dss.2006.06.011","volume":"42","author":"D Ghosh","year":"2007","unstructured":"Ghosh, D., Sharman, R., Rao, H.R., Upadhyaya, S.: Self-healing systems\u2013survey and synthesis. J. Decis. Support Syst. 42(4), 2164\u20132185 (2007)","journal-title":"J. Decis. Support Syst."},{"key":"379_CR8","unstructured":"Simmons, C., Ellis, C., Shiva, S., Dasgupta, D., Wu, Q.: AVOIDIT: a cyber attack taxonomy. Technical report: CS-09-003, University of Memphis (2009)"},{"key":"379_CR9","unstructured":"Lough, D.: A taxonomy of computer attacks with applications to wireless networks. PhD thesis dissertation, Virginia Polytechnic Institute and State University (2001)"},{"issue":"5","key":"379_CR10","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1016\/S0167-4048(03)00512-1","volume":"22","author":"G Alvarez","year":"2003","unstructured":"Alvarez, G., Petrovic, S.: A new taxonomy of web attacks suitable for efficient encoding. J. Comput. Secur. 22(5), 435\u2013449 (2003)","journal-title":"J. Comput. Secur."},{"key":"379_CR11","unstructured":"Howard, J.D.: An analysis of security incidents on the Internet. PhD thesis dissertation, Carnegie Mellon University, Department of Engineering and Public Policy (1997)"},{"issue":"3","key":"379_CR12","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1145\/185403.185412","volume":"26","author":"CE Landwehr","year":"1994","unstructured":"Landwehr, C.E., Bull, A.R., McDermott, J.P., Choi, W.S.: A taxonomy of computer program security flaws, with examples. ACM Comput. Surv. 26(3), 211\u2013254 (1994)","journal-title":"ACM Comput. Surv."},{"key":"379_CR13","unstructured":"Bishop, M.: A taxonomy of Unix and network security vulnerabilities. Technical report, Department of Computer Science, University of California at Davis (1995)"},{"key":"379_CR14","doi-asserted-by":"crossref","unstructured":"Chen, H., Mao, Y., Wang, X., Zhou, D., Zeldovich, N., Frans Kaashoek, M.: Linux kernel vulnerabilities: state-of-the-art defenses and open problems. In: Proceedings of the Second Asia-Pacific Workshop on Systems (2011)","DOI":"10.1145\/2103799.2103805"},{"key":"379_CR15","unstructured":"Mokhov, S., Laverdire, M., Benredjem, D.: Taxonomy of Linux kernel vulnerability solutions. In: Proceedings of the International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (2007)"},{"key":"379_CR16","unstructured":"Argyroudis, P., Glynos, D.: Protecting the core kernel exploitation mitigations. Black Hat Europe (2011)"},{"key":"379_CR17","doi-asserted-by":"crossref","unstructured":"Zhou, M., Chen, Q., Mockus, A., Wu, F.: On the scalability of Linux kernel maintainers\u2019 work. In: Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering 2017 Aug 21 (pp. 27\u201337). ACM","DOI":"10.1145\/3106237.3106287"},{"key":"379_CR18","unstructured":"Mell, P., Scarfone, K., Romanosky, S.: A complete guide to the common vulnerability scoring system version 2.0. http:\/\/www.first.org\/cvss\/cvss-guide.html"},{"key":"379_CR19","unstructured":"Santos, O.: The sequel, the evolution of scoring security vulnerabilities (2016)"},{"key":"379_CR20","unstructured":"Eiram, C., Martin, B.: The CVSSv2 shortcomings, faults, and failures formulation. Technical report, Forum of Incident Response and Security Teams (FIRST) (2013)"},{"key":"379_CR21","unstructured":"Dang, T., Wagner, D.: The performance cost of shadow stacks and stack canaries, pp. 1\u201312"},{"key":"379_CR22","unstructured":"Canepa, G.: How to secure network services using TCP wrappers in Linux (2016)"},{"key":"379_CR23","unstructured":"KASAN, The Kernel Address Sanitizer (KASAN). www.kernel.org\/doc\/html\/v4.10\/dev-tools\/kasan.html (2017)"},{"key":"379_CR24","unstructured":"Wu, W., Chen, Y., Xu, J., Xing, X., Gong, X., Zou, W.: FUZE: towards facilitating exploit generation for kernel use-after-free vulnerabilities. In: 27th USENIX Security Symposium (USENIX Security 18), pp. 781\u2013797 (2018)"},{"key":"379_CR25","doi-asserted-by":"crossref","unstructured":"Caballero, J., Grieco, G., Marron, M., Nappa, A.: Undangle: early detection of dangling pointers in use-after-free and double-free vulnerabilities. In: Proceedings of the 2012 International Symposium on Software Testing and Analysis, pp. 133\u2013143. ACM (2012)","DOI":"10.1145\/2338965.2336769"},{"key":"379_CR26","doi-asserted-by":"crossref","unstructured":"Lee, B., Song, C., Jang, Y., Wang, T., Kim, T., Lu, L., Lee, W.: Preventing use-after-free with dangling pointers nullification. In: NDSS (2015)","DOI":"10.14722\/ndss.2015.23238"},{"key":"379_CR27","unstructured":"Smatch the source matcher. http:\/\/smatch.sourceforge.net\/. Accessed on 30\/3\/2021"},{"key":"379_CR28","unstructured":"Coccinelle: A program matching and transformation tool for systems code. http:\/\/coccinelle.lip6.fr\/. Accessed on 20\/12\/2018"},{"key":"379_CR29","doi-asserted-by":"crossref","unstructured":"Abal, I., Brabrand, C., Wsowski, A.: Effective bug finding in c programs with shape and effect abstractions. In: International Conference on Verification. Model Checking, and Abstract Interpretation, pp. 34\u201354. Springer, Cham (2017)","DOI":"10.1007\/978-3-319-52234-0_3"},{"key":"379_CR30","unstructured":"Tsyrklevich, E., Yee, B.: Dynamic detection and prevention of race conditions in file accesses. PhD diss, University of California, San Diego (2003)"},{"key":"379_CR31","unstructured":"National Security Agency (NSA) and Federal Bureau of Investigation (FBI). Russian GRU 85th GTsSS Deploys Previously Undisclosed Drovorub Malware. August 2020 Rev 1.0"},{"key":"379_CR32","doi-asserted-by":"crossref","unstructured":"Xu, W., Li, J., Shu, J., Yang, W., Xie, T., Zhang, Y., Gu, D.: From collision to exploitation: unleashing use-after-free vulnerabilities in linux kernel. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security 2015 Oct 12 (pp. 414\u2013425). ACM","DOI":"10.1145\/2810103.2813637"},{"key":"379_CR33","doi-asserted-by":"crossref","unstructured":"Allodi, L., Banescu, S., Femmer, H., Beckers, K.: . Identifying relevant information cues for vulnerability assessment using CVSS. In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy (pp. 119\u2013126). ACM (2018, March)","DOI":"10.1145\/3176258.3176340"},{"key":"379_CR34","unstructured":"Mell, P., Scarfone, K., Romanosky, S.: A complete guide to the common vulnerability scoring system version 2.0. In: Published by FIRST-Forum of Incident Response and Security Teams (vol. 1, p. 23) (2007, June)"}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-021-00379-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11416-021-00379-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-021-00379-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T05:47:07Z","timestamp":1633067227000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11416-021-00379-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,4]]},"references-count":34,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["379"],"URL":"https:\/\/doi.org\/10.1007\/s11416-021-00379-x","relation":{},"ISSN":["2263-8733"],"issn-type":[{"type":"electronic","value":"2263-8733"}],"subject":[],"published":{"date-parts":[[2021,4,4]]},"assertion":[{"value":"20 July 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 March 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 April 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}