{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:22:48Z","timestamp":1772040168084,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,7,11]],"date-time":"2011-07-11T00:00:00Z","timestamp":1310342400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["N66001-10-2-4089"],"award-info":[{"award-number":["N66001-10-2-4089"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,7,11]]},"DOI":"10.1145\/2103799.2103805","type":"proceedings-article","created":{"date-parts":[[2012,1,24]],"date-time":"2012-01-24T16:47:19Z","timestamp":1327423639000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":108,"title":["Linux kernel vulnerabilities"],"prefix":"10.1145","author":[{"given":"Haogang","family":"Chen","sequence":"first","affiliation":[{"name":"MIT CSAIL"}]},{"given":"Yandong","family":"Mao","sequence":"additional","affiliation":[{"name":"MIT CSAIL"}]},{"given":"Xi","family":"Wang","sequence":"additional","affiliation":[{"name":"MIT CSAIL"}]},{"given":"Dong","family":"Zhou","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]},{"given":"Nickolai","family":"Zeldovich","sequence":"additional","affiliation":[{"name":"MIT CSAIL"}]},{"given":"M. Frans","family":"Kaashoek","sequence":"additional","affiliation":[{"name":"MIT CSAIL"}]}],"member":"320","published-online":{"date-parts":[[2011,7,11]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Smatch. http:\/\/smatch.sourceforge.net\/.  Smatch. http:\/\/smatch.sourceforge.net\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Sparse. http:\/\/sparse.wiki.kernel.org\/.  Sparse. http:\/\/sparse.wiki.kernel.org\/."},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the 12th Workshop on Hot Topics in Operating Systems","author":"Arnold J.","year":"2009","unstructured":"J. Arnold , T. Abbott , W. Daher , G. Price , N. Elhage , G. Thomas , and A. Kaseorg . Security impact ratings considered harmful . In Proceedings of the 12th Workshop on Hot Topics in Operating Systems , Monte Verita, Switzerland , May 2009 . J. Arnold, T. Abbott, W. Daher, G. Price, N. Elhage, G. Thomas, and A. Kaseorg. Security impact ratings considered harmful. In Proceedings of the 12th Workshop on Hot Topics in Operating Systems, Monte Verita, Switzerland, May 2009."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/829514.830533"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855840.1855849"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629581"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346284"},{"key":"e_1_3_2_1_8_1","unstructured":"S. Christey and R. A. Martin. Vulnerability type distributions in CVE. http:\/\/cve.mitre.org\/docs\/vuln-trends\/vuln-trends.pdf 2007.  S. Christey and R. A. Martin. Vulnerability type distributions in CVE. http:\/\/cve.mitre.org\/docs\/vuln-trends\/vuln-trends.pdf 2007."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134029"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the 19th Usenix Security Symposium","author":"Dalton M.","year":"2008","unstructured":"M. Dalton , H. Kannan , and C. Kozyrakis . Real-world buffer overflow protection for userspace and kernelspace . In Proceedings of the 19th Usenix Security Symposium , San Jose, CA , July 2008 . M. Dalton, H. Kannan, and C. Kozyrakis. Real-world buffer overflow protection for userspace and kernelspace. In Proceedings of the 19th Usenix Security Symposium, San Jose, CA, July 2008."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250784"},{"key":"e_1_3_2_1_12_1","unstructured":"N. Elhage. CVE-2010-4258: Turning denial-of-service into privilege escalation. http:\/\/blog.nelhage.com\/2010\/12\/cve-2010-4258-from-dos-to-privesc\/ 2010.  N. Elhage. CVE-2010-4258: Turning denial-of-service into privilege escalation. http:\/\/blog.nelhage.com\/2010\/12\/cve-2010-4258-from-dos-to-privesc\/ 2010."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251229.1251230"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502041"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 7th Symposium on Operating Systems Design and Implementation","author":"Abadi M.","year":"2006","unstructured":"\u00da. Erlingsson, M. Abadi , M. Vrable , M. Budiu , and G. C. Necula . XFI: Software guards for system address spaces . In Proceedings of the 7th Symposium on Operating Systems Design and Implementation , Seattle, WA , November 2006 . \u00da. Erlingsson, M. Abadi, M. Vrable, M. Budiu, and G. C. Necula. XFI: Software guards for system address spaces. In Proceedings of the 7th Symposium on Operating Systems Design and Implementation, Seattle, WA, November 2006."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1151374.1151391"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the 14th Usenix Security Symposium","author":"Jim C.","year":"2005","unstructured":"C. Jim , P. Ben , G. Tal , and R. Mendel . Shredding your garbage: reducing data lifetime through secure deallocation . In Proceedings of the 14th Usenix Security Symposium , Baltimore, MD , August 2005 . C. Jim, P. Ben, G. Tal, and R. Mendel. Shredding your garbage: reducing data lifetime through secure deallocation. In Proceedings of the 14th Usenix Security Symposium, Baltimore, MD, August 2005."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508251"},{"key":"e_1_3_2_1_19_1","volume-title":"E-learning, E-assessment, and Education","author":"Mokhov S. A.","year":"2008","unstructured":"S. A. Mokhov , M.-A. Laverdiere , and D. Benredjem . Taxonomy of Linux kernel vulnerability solutions. Innovative Techniques in Instruction Technology , E-learning, E-assessment, and Education , 2008 . S. A. Mokhov, M.-A. Laverdiere, and D. Benredjem. Taxonomy of Linux kernel vulnerability solutions. Innovative Techniques in Instruction Technology, E-learning, E-assessment, and Education, 2008."},{"key":"e_1_3_2_1_20_1","unstructured":"V. Nossum. Getting started with kmemcheck. http:\/\/www.mjmwired.net\/kernel\/Documentation\/kmemcheck.txt.  V. Nossum. Getting started with kmemcheck. http:\/\/www.mjmwired.net\/kernel\/Documentation\/kmemcheck.txt."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950401"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294294"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251254.1251255"},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of the 7th Symposium on Operating Systems Design and Implementation","author":"Ta-Min R.","year":"2006","unstructured":"R. Ta-Min , L. Litty , and D. Lie . Splitting interfaces: Making trust between applications and operating systems configurable . In Proceedings of the 7th Symposium on Operating Systems Design and Implementation , Seattle, WA , November 2006 . R. Ta-Min, L. Litty, and D. Lie. Splitting interfaces: Making trust between applications and operating systems configurable. In Proceedings of the 7th Symposium on Operating Systems Design and Implementation, Seattle, WA, November 2006."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1040305.1040334"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/1267308.1267327"},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the 8th Symposium on Operating Systems Design and Implementation","author":"Zeldovich N.","year":"2008","unstructured":"N. Zeldovich , H. Kannan , M. Dalton , and C. Kozyrakis . Hardware enforcement of application security policies . In Proceedings of the 8th Symposium on Operating Systems Design and Implementation , San Diego, CA , December 2008 . N. Zeldovich, H. Kannan, M. Dalton, and C. Kozyrakis. Hardware enforcement of application security policies. In Proceedings of the 8th Symposium on Operating Systems Design and Implementation, San Diego, CA, December 2008."}],"event":{"name":"APSys '11: Asia Pacific Workshop on Systems","location":"Shanghai China","acronym":"APSys '11","sponsor":["USENIX Assoc USENIX Assoc","SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the Second Asia-Pacific Workshop on Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2103799.2103805","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2103799.2103805","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:06:36Z","timestamp":1750241196000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2103799.2103805"}},"subtitle":["state-of-the-art defenses and open problems"],"short-title":[],"issued":{"date-parts":[[2011,7,11]]},"references-count":28,"alternative-id":["10.1145\/2103799.2103805","10.1145\/2103799"],"URL":"https:\/\/doi.org\/10.1145\/2103799.2103805","relation":{},"subject":[],"published":{"date-parts":[[2011,7,11]]},"assertion":[{"value":"2011-07-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}