{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,11]],"date-time":"2025-07-11T00:03:57Z","timestamp":1752192237361,"version":"3.41.2"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031976193","type":"print"},{"value":"9783031976209","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-97620-9_7","type":"book-chapter","created":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T09:27:35Z","timestamp":1752139655000},"page":"118-139","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SyzForge: An Automated System Call Specification Generation Process for\u00a0Efficient Kernel Fuzzing"],"prefix":"10.1007","author":[{"given":"ZhiZhuo","family":"Tang","sequence":"first","affiliation":[]},{"given":"Jian","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Weiyu","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Hang","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Tieming","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,10]]},"reference":[{"key":"7_CR1","unstructured":"The Linux Kernel Archives. https:\/\/www.kernel.org\/"},{"key":"7_CR2","unstructured":"Syzbot. https:\/\/syzkaller.appspot.com\/upstream\/"},{"key":"7_CR3","unstructured":"Google: Syzkaller. GitHub Repository. https:\/\/github.com\/google\/syzkaller\/"},{"key":"7_CR4","unstructured":"NCC Group: TriforceLinuxSyscallFuzzer. GitHub repository (2016). https:\/\/github.com\/nccgroup\/TriforceLinuxSyscallFuzzer"},{"key":"7_CR5","unstructured":"Oracle: Kernel-Fuzzing. https:\/\/github.com\/oracle\/kernel-fuzzing"},{"key":"7_CR6","unstructured":"Wikipedia contributors: Virtual file system. https:\/\/en.wikipedia.org\/wiki\/Virtual_file_system\/"},{"key":"7_CR7","unstructured":"The Linux Kernel Archives: usbmon documentation. https:\/\/docs.kernel.org\/usb\/usbmon.html"},{"key":"7_CR8","unstructured":"DeepSeek: DeepSeek-R1. GitHub Repository. https:\/\/github.com\/deepseek-ai\/DeepSeek-R1"},{"key":"7_CR9","unstructured":"OpenAI: GPT-4 Documentation. https:\/\/platform.openai.com\/docs\/models\/gpt-4-and-gpt-4-turbo"},{"key":"7_CR10","unstructured":"Syzlang Syntax Documentation. https:\/\/github.com\/google\/syzkaller\/blob\/master\/docs\/syscall_descriptions_syntax.md"},{"key":"7_CR11","unstructured":"The Linux Kernel Archives: Linux Kernel v6.12 Source Code. https:\/\/elixir.bootlin.com\/linux\/v6.12\/source"},{"key":"7_CR12","unstructured":"LLVM Developer Group: Clang Static Analyzer. https:\/\/clang-analyzer.llvm.org\/"},{"key":"7_CR13","unstructured":"The FreeBSD Project. https:\/\/www.freebsd.org\/"},{"key":"7_CR14","unstructured":"Wikipedia contributors: HFS Plus. https:\/\/en.wikipedia.org\/wiki\/HFS_Plus"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Chen, W., Wang, Y., Zhang, Z., et al.: SyzGen: automated generation of Syscall specification of closed-source macos drivers. In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (CCS), Virtual Event, South Korea, pp. 749\u2013763. ACM (2021)","DOI":"10.1145\/3460120.3484564"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Corina, J., Machiry, A., Salls, C., et al.: DIFUZE: interface aware fuzzing for kernel drivers. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS), Dallas, TX, USA, pp. 2123\u20132138. ACM (2017)","DOI":"10.1145\/3133956.3134069"},{"key":"7_CR17","unstructured":"Sun, H., Shen, Y., Liu, J., et al.: KSG: augmenting kernel fuzzing with system call specification generation. In: Proceedings of the 2022 USENIX Annual Technical Conference (ATC), Carlsbad, CA, USA, pp. 351\u2013366. USENIX Association (2022)"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Hao, Y., Li, G., Zou, X., et al.: SyzDescribe: principled, automated, static generation of syscall descriptions for kernel drivers. In: Proceedings of the 2023 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, pp. 3262\u20133278. IEEE (2023)","DOI":"10.1109\/SP46215.2023.10179298"},{"key":"7_CR19","unstructured":"Yang, C., Zhao, Z., Zhang, L.: KernelGPT: enhanced kernel fuzzing via large language models. arXiv preprint arXiv:2401.00563 (2023)"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Chen, W., Hao, Y., Zhang, Z., et al.: SyzGen++: dependency inference for augmenting kernel driver fuzzing. In: Proceedings of the 2024 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, pp. 4661\u20134677. IEEE (2024)","DOI":"10.1109\/SP54263.2024.00269"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Bulekov, A., Das, B., Hajnoczi, S., et al.: No grammar, no problem: towards fuzzing the linux kernel without system-call descriptions. In: Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA (2023)","DOI":"10.14722\/ndss.2023.24688"},{"key":"7_CR22","unstructured":"Cadar, C., Dunbar, D., Engler, D.: KLEE: unassisted and automatic generation of high-coverage tests for complex systems programs. In: 8th USENIX Symposium on Operating Systems Design and Implementation (OSDI 2008), San Diego, CA, pp. 209\u2013224. USENIX Association (2008)"},{"key":"7_CR23","doi-asserted-by":"publisher","unstructured":"de Moura, L., Bj\u00f8rner, N.: Z3: an efficient SMT solver. In: Ramakrishnan, C.R., Rehof, J. (eds.) Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2008). LNCS, vol. 4963, pp. 337\u2013340. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-78800-3_24","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Lu, K., Hu, H.: Where does it go? Refining indirect-call targets with multi-layer type analysis. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (2019)","DOI":"10.1145\/3319535.3354244"},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"Bang, Y., Cahyawijaya, S., Lee, N., et al.: A multitask, multilingual, multimodal evaluation of chatGPT on reasoning, hallucination, and interactivity. arXiv preprint arXiv:2302.04023 (2023)","DOI":"10.18653\/v1\/2023.ijcnlp-main.45"}],"container-title":["Lecture Notes in Computer Science","Detection of Intrusions and Malware, and Vulnerability Assessment"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-97620-9_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T09:27:39Z","timestamp":1752139659000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-97620-9_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031976193","9783031976209"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-97620-9_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"10 July 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DIMVA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Graz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dimva2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dimva.org\/dimva2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}