{"id":"https://openalex.org/W4312559167","doi":"https://doi.org/10.1109/ic2e55432.2022.00033","title":"Understanding Software Security Vulnerabilities in Cloud Server Systems","display_name":"Understanding Software Security Vulnerabilities in Cloud Server Systems","publication_year":2022,"publication_date":"2022-09-01","ids":{"openalex":"https://openalex.org/W4312559167","doi":"https://doi.org/10.1109/ic2e55432.2022.00033"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/ic2e55432.2022.00033","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072717905","display_name":"Olufogorehan Tunde-Onadele","orcid":"https://orcid.org/0009-0000-7996-2939"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"funder","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Olufogorehan Tunde-Onadele","raw_affiliation_strings":["North Carolina State University"],"affiliations":[{"raw_affiliation_string":"North Carolina State University","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016611001","display_name":"Yuhang Lin","orcid":"https://orcid.org/0000-0001-9446-2625"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"funder","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yuhang Lin","raw_affiliation_strings":["North Carolina State University"],"affiliations":[{"raw_affiliation_string":"North Carolina State University","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102976136","display_name":"Xiaohui Gu","orcid":"https://orcid.org/0000-0001-8811-0084"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"funder","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaohui Gu","raw_affiliation_strings":["North Carolina State University"],"affiliations":[{"raw_affiliation_string":"North Carolina State University","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080326162","display_name":"Jingzhu He","orcid":"https://orcid.org/0009-0005-9448-5022"},"institutions":[{"id":"https://openalex.org/I30809798","display_name":"ShanghaiTech University","ror":"https://ror.org/030bhh786","country_code":"CN","type":"funder","lineage":["https://openalex.org/I30809798"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingzhu He","raw_affiliation_strings":["ShanghaiTech University"],"affiliations":[{"raw_affiliation_string":"ShanghaiTech University","institution_ids":["https://openalex.org/I30809798"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.169,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.374882,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":59,"max":69},"biblio":{"volume":null,"issue":null,"first_page":"245","last_page":"252"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9988,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/security-bug","display_name":"Security bug","score":0.66762316},{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.63763237},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability","score":0.58700454},{"id":"https://openalex.org/keywords/vulnerability-management","display_name":"Vulnerability management","score":0.5832956},{"id":"https://openalex.org/keywords/software-bug","display_name":"Software bug","score":0.44886175},{"id":"https://openalex.org/keywords/security-through-obscurity","display_name":"Security through obscurity","score":0.44386053}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7897201},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.736328},{"id":"https://openalex.org/C131275738","wikidata":"https://www.wikidata.org/wiki/Q7445023","display_name":"Security bug","level":5,"score":0.66762316},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.63763237},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.60650367},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.58700454},{"id":"https://openalex.org/C172776598","wikidata":"https://www.wikidata.org/wiki/Q7943570","display_name":"Vulnerability management","level":4,"score":0.5832956},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.57634664},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.45248467},{"id":"https://openalex.org/C1009929","wikidata":"https://www.wikidata.org/wiki/Q179550","display_name":"Software bug","level":3,"score":0.44886175},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.44870323},{"id":"https://openalex.org/C114869243","wikidata":"https://www.wikidata.org/wiki/Q133735","display_name":"Security through obscurity","level":5,"score":0.44386053},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.35243487},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.28089854},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.26197818},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.24423239},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11048415},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/ic2e55432.2022.00033","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":15,"referenced_works":["https://openalex.org/W1967446222","https://openalex.org/W1976721395","https://openalex.org/W1990089904","https://openalex.org/W2125011234","https://openalex.org/W2598200822","https://openalex.org/W2618635610","https://openalex.org/W2759023773","https://openalex.org/W2767094836","https://openalex.org/W2804035958","https://openalex.org/W3003877692","https://openalex.org/W3091647382","https://openalex.org/W3096602848","https://openalex.org/W3110723107","https://openalex.org/W3162285135","https://openalex.org/W3182640725"],"related_works":["https://openalex.org/W658105165","https://openalex.org/W4384518368","https://openalex.org/W3201294019","https://openalex.org/W3041665175","https://openalex.org/W2560421591","https://openalex.org/W2499489413","https://openalex.org/W2406043920","https://openalex.org/W2392503306","https://openalex.org/W2088401352","https://openalex.org/W2007984522"],"abstract_inverted_index":{"Cloud":[0],"systems":[1,18,28],"have":[2],"been":[3],"widely":[4],"adopted":[5],"by":[6],"many":[7],"real":[8],"world":[9],"production":[10],"applications.":[11],"Thus,":[12],"security":[13,31,41,57,83,112],"vulnerabilities":[14,42,113],"in":[15,59],"those":[16,40,82,90,99,149],"cloud":[17,62],"can":[19,29],"cause":[20,39],"serious":[21],"widespread":[22],"impact.":[23],"Although":[24],"previous":[25],"intrusion":[26],"detection":[27],"detect":[30],"attacks,":[32],"understanding":[33],"the":[34,67,72,78,106,110],"underlying":[35,68],"software":[36,56],"defects":[37],"that":[38,105],"is":[43],"little":[44],"studied.":[45],"In":[46],"this":[47],"paper,":[48],"we":[49,70],"conduct":[50],"a":[51],"systematic":[52],"study":[53],"over":[54],"110":[55],"vulnera-bilities":[58],"13":[60],"popular":[61],"server":[63],"systems.":[64],"To":[65],"understand":[66],"vulnerabilities,":[69],"answer":[71],"following":[73],"questions:":[74],"1)":[75,118],"what":[76,86],"are":[77],"root":[79],"causes":[80],"of":[81,109],"vulnerabilities?":[84],"2)":[85,122],"threat":[87],"impact":[88],"do":[89,96],"vulnerable":[91,100,107,145],"code":[92,108,146],"have?":[93],"3)":[94,126],"how":[95],"developers":[97],"patch":[98],"code?":[101],"Our":[102],"results":[103],"show":[104],"studied":[111],"comprise":[114],"five":[115],"common":[116,150],"categories:":[117],"improper":[119,123,127,132,138],"execution":[120],"restrictions,":[121],"permission":[124],"checks,":[125,130],"resource":[128],"path-name":[129],"4)":[131],"sensitive":[133],"data":[134],"handling,":[135],"and":[136],"5)":[137],"synchronization":[139],"handling.":[140],"We":[141],"further":[142],"extract":[143],"principal":[144],"patterns":[147],"from":[148],"vulnerability":[151],"categories.":[152]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4312559167","counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2025-04-16T19:46:16.877099","created_date":"2023-01-05"}