{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:11:05Z","timestamp":1772039465679,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":89,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T00:00:00Z","timestamp":1727654400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Research Foundation, Singapore","award":["NCR25-NCL P3-0001"],"award-info":[{"award-number":["NCR25-NCL P3-0001"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,9,30]]},"DOI":"10.1145\/3678890.3678891","type":"proceedings-article","created":{"date-parts":[[2024,9,29]],"date-time":"2024-09-29T22:23:36Z","timestamp":1727648616000},"page":"384-402","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-5500-6060","authenticated-orcid":false,"given":"Bonan","family":"Ruan","sequence":"first","affiliation":[{"name":"National University of Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-0969-6891","authenticated-orcid":false,"given":"Jiahao","family":"Liu","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-3550-696X","authenticated-orcid":false,"given":"Chuqi","family":"Zhang","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7138-5030","authenticated-orcid":false,"given":"Zhenkai","family":"Liang","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2024,9,30]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Abubakar Muhammad","year":"2021","unstructured":"Muhammad Abubakar, Adil Ahmad, Pedro Fonseca, and Dongyan Xu. 2021. { SHARD} :{ Fine-Grained} Kernel Specialization with { Context-Aware} Hardening. In 30th USENIX Security Symposium (USENIX Security 21). 2435\u20132452."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978380"},{"key":"e_1_3_2_1_3_1","unstructured":"Hugues ANGUELKOV. [n. d.]. Re: Linux kernel: Netfilter heap buffer overflow in nft_set_elem_init. https:\/\/seclists.org\/oss-sec\/2022\/q3\/2."},{"key":"e_1_3_2_1_4_1","volume-title":"AEG: Automatic Exploit Generation. In Network and Distributed System Security Symposium. https:\/\/api.semanticscholar.org\/CorpusID:14420062","author":"Avgerinos Thanassis","year":"2011","unstructured":"Thanassis Avgerinos, Sang\u00a0Kil Cha, Brent Lim\u00a0Tze Hao, and David Brumley. 2011. AEG: Automatic Exploit Generation. In Network and Distributed System Security Symposium. https:\/\/api.semanticscholar.org\/CorpusID:14420062"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510113"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.67"},{"key":"e_1_3_2_1_7_1","unstructured":"Fabrice Bellard. 2005. QEMU a fast and portable dynamic translator.. In USENIX annual technical conference FREENIX Track Vol.\u00a041. Califor-nia USA 46."},{"key":"e_1_3_2_1_8_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Bhattacharyya Atri","year":"2022","unstructured":"Atri Bhattacharyya, Uros Tesic, and Mathias Payer. 2022. Midas: Systematic Kernel { TOCTTOU} Protection. In 31st USENIX Security Symposium (USENIX Security 22). 107\u2013124."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.17"},{"key":"e_1_3_2_1_10_1","unstructured":"bsauce. 2022. Comments for CVE-2021-22555. https:\/\/github.com\/bsauce\/blog-comment\/issues\/23."},{"key":"e_1_3_2_1_11_1","unstructured":"bsauce. 2022. Comments for CVE-2022-0185. https:\/\/github.com\/bsauce\/blog-comment\/issues\/28."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180445"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom53373.2021.00030"},{"key":"e_1_3_2_1_14_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Chen Weiteng","year":"2020","unstructured":"Weiteng Chen, Xiaochen Zou, Guoren Li, and Zhiyun Qian. 2020. { KOOBE} : towards facilitating exploit generation of kernel { Out-Of-Bounds} write vulnerabilities. In 29th USENIX Security Symposium (USENIX Security 20). 1093\u20131110."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423353"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363212"},{"key":"e_1_3_2_1_17_1","unstructured":"Vincent Dehors. [n. d.]. Exploitation of a double free vulnerability in Ubuntu shiftfs driver (CVE-2021-3492). http:\/\/bit.ly\/46U6Zjm."},{"key":"e_1_3_2_1_18_1","volume-title":"28th USENIX security symposium (USENIX Security 19). 869\u2013885.","author":"Dong Ying","unstructured":"Ying Dong, Wenbo Guo, Yueqi Chen, Xinyu Xing, Yuqing Zhang, and Gang Wang. 2019. Towards the detection of inconsistencies in public security vulnerability reports. In 28th USENIX security symposium (USENIX Security 19). 869\u2013885."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP52600.2021.00018"},{"key":"e_1_3_2_1_20_1","volume-title":"Linux: Heap Out-Of-Bounds Write in xt_compat_target_from_user. https:\/\/github.com\/google\/security-research\/security\/advisories\/GHSA-xxx5-8mvq-3528.","year":"2022","unstructured":"Google. 2022. Linux: Heap Out-Of-Bounds Write in xt_compat_target_from_user. https:\/\/github.com\/google\/security-research\/security\/advisories\/GHSA-xxx5-8mvq-3528."},{"key":"e_1_3_2_1_21_1","unstructured":"Google. 2024. GitHub - google\/syzkaller: syzkaller is an unsupervised coverage-guided kernel fuzzer. https:\/\/github.com\/google\/syzkaller."},{"key":"e_1_3_2_1_22_1","unstructured":"Google. 2024. syzkaller\/executor\/common_linux.h. https:\/\/github.com\/google\/syzkaller\/blob\/master\/executor\/common_linux.h."},{"key":"e_1_3_2_1_23_1","unstructured":"Google. 2024. syzkaller\/tools\/create-image.sh. https:\/\/github.com\/google\/syzkaller\/blob\/master\/tools\/create-image.sh."},{"key":"e_1_3_2_1_24_1","volume-title":"Static Generation of Syscall Descriptions for Kernel Drivers. In 2023 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 3262\u20133278","author":"Hao Yu","year":"2023","unstructured":"Yu Hao, Guoren Li, Xiaochen Zou, Weiteng Chen, Shitong Zhu, Zhiyun Qian, and Ardalan\u00a0Amiri Sani. 2023. SyzDescribe: Principled, Automated, Static Generation of Syscall Descriptions for Kernel Drivers. In 2023 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 3262\u20133278."},{"key":"e_1_3_2_1_25_1","unstructured":"Patrick\u00a0McHardy Harald\u00a0Welte. [n. d.]. net\/netfilter\/x_tables.c. https:\/\/bit.ly\/4aslkH0."},{"key":"e_1_3_2_1_26_1","unstructured":"Red Hat. 2024. Red Hat Bugzilla Main Page. https:\/\/bugzilla.redhat.com\/."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354224"},{"key":"e_1_3_2_1_28_1","volume-title":"Analyzing the Internal Consistency of the Linux KConfig Model. Ph.\u00a0D. Dissertation. Master\u2019s thesis","author":"Hengelein Stefan","unstructured":"Stefan Hengelein and Daniel Lohmann. 2015. Analyzing the Internal Consistency of the Linux KConfig Model. Ph.\u00a0D. Dissertation. Master\u2019s thesis. University of Erlangen, Dept. of Computer Science."},{"key":"e_1_3_2_1_29_1","unstructured":"Jamie Hill-Daniel. 2022. kernel\/git\/torvalds\/linux.git. https:\/\/bit.ly\/4aknIPN."},{"key":"e_1_3_2_1_30_1","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Hu Hong","year":"2015","unstructured":"Hong Hu, Zheng\u00a0Leong Chua, Sendroiu Adrian, Prateek Saxena, and Zhenkai Liang. 2015. Automatic Generation of { Data-Oriented} Exploits. In 24th USENIX Security Symposium (USENIX Security 15). 177\u2013192."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00017"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179398"},{"key":"e_1_3_2_1_33_1","volume-title":"AEM: Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities. In 2023 IEEE Symposium on Security and Privacy (SP). IEEE, 2122\u20132137","author":"Jiang Zheyue","year":"2023","unstructured":"Zheyue Jiang, Yuan Zhang, Jun Xu, Xinqian Sun, Zhuang Liu, and Min Yang. 2023. AEM: Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities. In 2023 IEEE Symposium on Security and Privacy (SP). IEEE, 2122\u20132137."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417240"},{"key":"e_1_3_2_1_35_1","volume-title":"Applying Patches To The Linux Kernel","author":"Juhl Jesper","unstructured":"Jesper Juhl. 2024. Applying Patches To The Linux Kernel; The Linux Kernel documentation. https:\/\/www.kernel.org\/doc\/html\/next\/process\/applying-patches.html."},{"key":"e_1_3_2_1_36_1","unstructured":"kashyapc.fedorapeople.org. [n. d.]. Snapshots Handout. https:\/\/kashyapc.fedorapeople.org\/virt\/lc-2012\/snapshots-handout.html."},{"key":"e_1_3_2_1_37_1","unstructured":"kernel.org. 2014. Kbuild; The Linux Kernel documentation. https:\/\/docs.kernel.org\/kbuild\/kbuild.html."},{"key":"e_1_3_2_1_38_1","unstructured":"kernel.org. 2024. Kconfig Language; The Linux Kernel documentation. https:\/\/www.kernel.org\/doc\/html\/next\/kbuild\/kconfig-language.html."},{"key":"e_1_3_2_1_39_1","unstructured":"kernel.org. 2024. Kernel.org. https:\/\/git.kernel.org\/."},{"key":"e_1_3_2_1_40_1","volume-title":"Submitting patches: the essential guide to getting your code into the kernel","unstructured":"kernel.org. 2024. Submitting patches: the essential guide to getting your code into the kernel; The Linux Kernel documentation. https:\/\/www.kernel.org\/doc\/html\/latest\/process\/submitting-patches.html"},{"key":"e_1_3_2_1_41_1","unstructured":"Michael Kerrisk. [n. d.]. proc(5). https:\/\/man7.org\/linux\/man-pages\/man5\/proc.5.html."},{"key":"e_1_3_2_1_42_1","unstructured":"Piotr Krysiuk. [n. d.]. Re: [CVE-2023-32233]Linux kernel use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary reads and writes in kernel memory. https:\/\/www.openwall.com\/lists\/oss-security\/2023\/05\/15\/5."},{"key":"e_1_3_2_1_43_1","unstructured":"Michael Larabel. 2021. Linux 5.12 Coming In At Around 28.8 Million Lines AMDGPU Driver Closing In On 3 Million. https:\/\/www.phoronix.com\/news\/Linux-5.12-rc1-Code-Size."},{"key":"e_1_3_2_1_44_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Lee Yoochan","year":"2023","unstructured":"Yoochan Lee, Jinhan Kwak, Junesoo Kang, Yuseok Jeon, and Byoungyoung Lee. 2023. Pspray: Timing { Side-Channel} based Linux Kernel Heap Exploitation Technique. In 32nd USENIX Security Symposium (USENIX Security 23). 6825\u20136842."},{"key":"e_1_3_2_1_45_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Lee Yoochan","year":"2021","unstructured":"Yoochan Lee, Changwoo Min, and Byoungyoung Lee. 2021. { ExpRace} : Exploiting kernel races through raising interrupts. In 30th USENIX Security Symposium (USENIX Security 21). 2363\u20132380."},{"key":"e_1_3_2_1_46_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Li Guoren","year":"2023","unstructured":"Guoren Li, Hang Zhang, Jinmeng Zhou, Wenbo Shen, Yulei Sui, and Zhiyun Qian. 2023. A hybrid alias analysis and its application to global variable protection in the linux kernel. In 32nd USENIX Security Symposium (USENIX Security 23). 4211\u20134228."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560585"},{"key":"e_1_3_2_1_48_1","unstructured":"Linux. 2024. Bugzilla. https:\/\/bugzilla.kernel.org\/."},{"key":"e_1_3_2_1_49_1","unstructured":"Linux. 2024. Index of \/pub\/linux\/kernel\/. https:\/\/mirrors.edge.kernel.org\/pub\/linux\/kernel\/."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.3390\/app122311925"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3226906"},{"key":"e_1_3_2_1_52_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Liu Jian","year":"2022","unstructured":"Jian Liu, Lin Yi, Weiteng Chen, Chengyu Song, Zhiyun Qian, and Qiuping Yi. 2022. { LinKRID} : Vetting Imbalance Reference Counting in Linux kernel with Symbolic Execution. In 31st USENIX Security Symposium (USENIX Security 22). 125\u2013142."},{"key":"e_1_3_2_1_53_1","unstructured":"lkml.org. 2024. LKML.ORG. https:\/\/lkml.org\/."},{"key":"e_1_3_2_1_54_1","unstructured":"Nicholas Luedtke. 2024. Linux Kernel CVEs. https:\/\/www.linuxkernelcves.com\/."},{"key":"e_1_3_2_1_55_1","unstructured":"LukeGix. [n. d.]. FUSE for Linux Exploitation 101. https:\/\/exploiter.dev\/blog\/2022\/FUSE-exploit.html."},{"key":"e_1_3_2_1_56_1","unstructured":"MITRE. 2024. CVE. https:\/\/cve.mitre.org\/."},{"key":"e_1_3_2_1_57_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Mu Dongliang","year":"2018","unstructured":"Dongliang Mu, Alejandro Cuevas, Limin Yang, Hang Hu, Xinyu Xing, Bing Mao, and Gang Wang. 2018. Understanding the reproducibility of crowd-reported security vulnerabilities. In 27th USENIX Security Symposium (USENIX Security 18). 919\u2013936."},{"key":"e_1_3_2_1_58_1","unstructured":"NetworkX. 2014. NetworkX. https:\/\/networkx.org\/."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9408-2"},{"key":"e_1_3_2_1_60_1","unstructured":"NVD. 2017. NVD - CVE-2017-18344. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-18344."},{"key":"e_1_3_2_1_61_1","unstructured":"NVD. 2018. NVD - CVE-2018-1000028. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-1000028."},{"key":"e_1_3_2_1_62_1","unstructured":"NVD. 2022. NVD - CVE-2022-0185. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-0185"},{"key":"e_1_3_2_1_63_1","unstructured":"NVD. 2022. NVD CVE-2021-22555. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-22555."},{"key":"e_1_3_2_1_64_1","unstructured":"NVD. 2024. National Vulnerability Database. https:\/\/nvd.nist.gov\/."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468578"},{"key":"e_1_3_2_1_66_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Park Sunnyeo","year":"2022","unstructured":"Sunnyeo Park, Daejun Kim, Suman Jana, and Sooel Son. 2022. { FUGIO} : Automatic Exploit Generation for { PHP} Object Injection Vulnerabilities. In 31st USENIX Security Symposium (USENIX Security 22). 197\u2013214."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.99"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623198"},{"key":"e_1_3_2_1_69_1","unstructured":"Andreas Ruprecht. 2015. Lightweight Extraction of Variability Information from Linux Makefiles. Ph.\u00a0D. Dissertation. Citeseer."},{"key":"e_1_3_2_1_70_1","unstructured":"Ubuntu. 2024. Security. https:\/\/ubuntu.com\/security."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00003"},{"key":"e_1_3_2_1_72_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Wang Ruipeng","year":"2023","unstructured":"Ruipeng Wang, Kaixiang Chen, Chao Zhang, Zulie Pan, Qianyu Li, Siliang Qin, Shenglin Xu, Min Zhang, and Yang Li. 2023. { AlphaEXP} : An Expert System for Identifying { Security-Sensitive} Kernel Objects. In 32nd USENIX Security Symposium (USENIX Security 23). 4229\u20134246."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243847"},{"key":"e_1_3_2_1_74_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Wang Yan","year":"2021","unstructured":"Yan Wang, Chao Zhang, Zixuan Zhao, Bolun Zhang, Xiaorui Gong, and Wei Zou. 2021. { MAZE} : Towards automated heap feng shui. In 30th USENIX Security Symposium (USENIX Security 21). 1647\u20131664."},{"key":"e_1_3_2_1_75_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Wang Zicheng","year":"2023","unstructured":"Zicheng Wang, Yueqi Chen, and Qingkai Zeng. 2023. { PET} : Prevent Discovered Errors from Being Triggered in the Linux Kernel. In 32nd USENIX Security Symposium (USENIX Security 23). 4193\u20134210."},{"key":"e_1_3_2_1_76_1","unstructured":"Florian Westphal. 2022. kernel\/git\/torvalds\/linux.git. https:\/\/bit.ly\/3NnVtpF."},{"key":"e_1_3_2_1_77_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Wu Wei","year":"2019","unstructured":"Wei Wu, Yueqi Chen, Xinyu Xing, and Wei Zou. 2019. { KEPLER} : Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerabilities. In 28th USENIX Security Symposium (USENIX Security 19). 1187\u20131204."},{"key":"e_1_3_2_1_78_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Wu Wei","year":"2018","unstructured":"Wei Wu, Yueqi Chen, Jun Xu, Xinyu Xing, Xiaorui Gong, and Wei Zou. 2018. { FUZE} : Towards Facilitating Exploit Generation for Kernel { Use-After-Free} Vulnerabilities. In 27th USENIX Security Symposium (USENIX Security 18). 781\u2013797."},{"key":"e_1_3_2_1_79_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Wu Yuhang","year":"2023","unstructured":"Yuhang Wu, Zhenpeng Lin, Yueqi Chen, Dang\u00a0K Le, Dongliang Mu, and Xinyu Xing. 2023. Mitigating Security Risks in Linux with { KLAUS} : A Method for Evaluating Patch Correctness. In 32nd USENIX Security Symposium (USENIX Security 23). 4247\u20134264."},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813637"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPSISA52974.2021.00016"},{"key":"e_1_3_2_1_82_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Yoo Sungbae","year":"2022","unstructured":"Sungbae Yoo, Jinbum Park, Seolheui Kim, Yeji Kim, and Taesoo Kim. 2022. { In-Kernel}{ Control-Flow} Integrity on Commodity { OSes} using { ARM} Pointer Authentication. In 31st USENIX Security Symposium (USENIX Security 22). 89\u2013106."},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134085"},{"key":"e_1_3_2_1_84_1","volume-title":"DDRace: Finding Concurrency UAF Vulnerabilities in Linux Drivers with Directed Fuzzing. In 32nd USENIX Security Symposium, USENIX Security 2023","author":"Yuan Ming","year":"2023","unstructured":"Ming Yuan, Bodong Zhao, Penghui Li, Jiashuo Liang, Xinhui Han, Xiapu Luo, and Chao Zhang. 2023. DDRace: Finding Concurrency UAF Vulnerabilities in Linux Drivers with Directed Fuzzing. In 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023. 2849\u20132866."},{"key":"e_1_3_2_1_85_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Zeng Kyle","year":"2022","unstructured":"Kyle Zeng, Yueqi Chen, Haehyun Cho, Xinyu Xing, Adam Doup\u00e9, Yan Shoshitaishvili, and Tiffany Bao. 2022. Playing for K(H)eaps: Understanding and Improving Linux Kernel Exploit Reliability. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA, 71\u201388. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/zeng"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623220"},{"key":"e_1_3_2_1_87_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Zhang Bin","year":"2023","unstructured":"Bin Zhang, Jiongyi Chen, Runhao Li, Chao Feng, Ruilin Li, and Chaojing Tang. 2023. Automated Exploitable Heap Layout Generation for Heap Overflows Through Manipulation { Distance-Guided} Fuzzing. In 32nd USENIX Security Symposium (USENIX Security 23). 4499\u20134515."},{"key":"e_1_3_2_1_88_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Zhang Hang","year":"2018","unstructured":"Hang Zhang and Zhiyun Qian. 2018. Precise and accurate patch presence test for binaries. In 27th USENIX Security Symposium (USENIX Security 18). 887\u2013902."},{"key":"e_1_3_2_1_89_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Zhao Bodong","year":"2022","unstructured":"Bodong Zhao, Zheming Li, Shisong Qin, Zheyu Ma, Ming Yuan, Wenyu Zhu, Zhihong Tian, and Chao Zhang. 2022. { StateFuzz} : System { Call-Based}{ State-Aware} Linux Driver Fuzzing. In 31st USENIX Security Symposium (USENIX Security 22). 3273\u20133289."}],"event":{"name":"RAID '24: The 27th International Symposium on Research in Attacks, Intrusions and Defenses","location":"Padua Italy","acronym":"RAID '24"},"container-title":["The 27th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678890.3678891","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3678890.3678891","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:00Z","timestamp":1750295880000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678890.3678891"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,30]]},"references-count":89,"alternative-id":["10.1145\/3678890.3678891","10.1145\/3678890"],"URL":"https:\/\/doi.org\/10.1145\/3678890.3678891","relation":{},"subject":[],"published":{"date-parts":[[2024,9,30]]},"assertion":[{"value":"2024-09-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}