{"id":"https://openalex.org/W4320002742","doi":"https://doi.org/10.1109/tc.2023.3240365","title":"Understanding and Mitigating Twin Function Misuses in Operating System Kernel","display_name":"Understanding and Mitigating Twin Function Misuses in Operating System Kernel","publication_year":2023,"publication_date":"2023-01-27","ids":{"openalex":"https://openalex.org/W4320002742","doi":"https://doi.org/10.1109/tc.2023.3240365"},"language":"en","primary_location":{"id":"doi:10.1109/tc.2023.3240365","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/tc.2023.3240365","pdf_url":null,"source":{"id":"https://openalex.org/S157670870","display_name":"IEEE Transactions on Computers","issn_l":"0018-9340","issn":["0018-9340","1557-9956","2326-3814"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computers","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102847820","display_name":"Jinyu Gu","orcid":"https://orcid.org/0000-0002-8112-8481"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jinyu Gu","raw_affiliation_strings":["Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101597375","display_name":"Jiacheng Shi","orcid":"https://orcid.org/0000-0002-2725-8955"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiacheng Shi","raw_affiliation_strings":["Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058520838","display_name":"Haroran Su","orcid":null},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haroran Su","raw_affiliation_strings":["Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007696149","display_name":"Wentai Li","orcid":"https://orcid.org/0000-0002-7463-9566"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wentai Li","raw_affiliation_strings":["Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031955160","display_name":"Binyu Zang","orcid":"https://orcid.org/0000-0002-1968-7645"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Binyu Zang","raw_affiliation_strings":["Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049487451","display_name":"Haibing Guan","orcid":"https://orcid.org/0000-0002-4714-7400"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haibing Guan","raw_affiliation_strings":["Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100406215","display_name":"Haibo Chen","orcid":"https://orcid.org/0000-0002-9720-0361"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haibo Chen","raw_affiliation_strings":["Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5102847820"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":0.1748,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.51076474,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"72","issue":"8","first_page":"2181","last_page":"2193"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.851347804069519},{"id":"https://openalex.org/keywords/linux-kernel","display_name":"Linux kernel","score":0.6573895812034607},{"id":"https://openalex.org/keywords/context-switch","display_name":"Context switch","score":0.644620418548584},{"id":"https://openalex.org/keywords/kernel","display_name":"Kernel (algebra)","score":0.5588147044181824},{"id":"https://openalex.org/keywords/thread","display_name":"Thread (computing)","score":0.5158573985099792},{"id":"https://openalex.org/keywords/pointer","display_name":"Pointer (user interface)","score":0.4585570693016052},{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.4478519558906555},{"id":"https://openalex.org/keywords/heap","display_name":"Heap (data structure)","score":0.4403458833694458},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.3975546360015869},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.36496099829673767},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3530427813529968},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.28555482625961304},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.16562223434448242},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.14482998847961426},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.09885573387145996}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.851347804069519},{"id":"https://openalex.org/C553261973","wikidata":"https://www.wikidata.org/wiki/Q14579","display_name":"Linux kernel","level":2,"score":0.6573895812034607},{"id":"https://openalex.org/C53833338","wikidata":"https://www.wikidata.org/wiki/Q1061424","display_name":"Context switch","level":2,"score":0.644620418548584},{"id":"https://openalex.org/C74193536","wikidata":"https://www.wikidata.org/wiki/Q574844","display_name":"Kernel (algebra)","level":2,"score":0.5588147044181824},{"id":"https://openalex.org/C138101251","wikidata":"https://www.wikidata.org/wiki/Q213092","display_name":"Thread (computing)","level":2,"score":0.5158573985099792},{"id":"https://openalex.org/C150202949","wikidata":"https://www.wikidata.org/wiki/Q107602","display_name":"Pointer (user interface)","level":2,"score":0.4585570693016052},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.4478519558906555},{"id":"https://openalex.org/C134757568","wikidata":"https://www.wikidata.org/wiki/Q274089","display_name":"Heap (data structure)","level":2,"score":0.4403458833694458},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3975546360015869},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.36496099829673767},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3530427813529968},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28555482625961304},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.16562223434448242},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.14482998847961426},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.09885573387145996},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tc.2023.3240365","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/tc.2023.3240365","pdf_url":null,"source":{"id":"https://openalex.org/S157670870","display_name":"IEEE Transactions on Computers","issn_l":"0018-9340","issn":["0018-9340","1557-9956","2326-3814"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computers","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2151649760","display_name":null,"funder_award_id":"62202292","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W1112477","https://openalex.org/W1521824845","https://openalex.org/W1746694335","https://openalex.org/W1976721395","https://openalex.org/W2104292255","https://openalex.org/W2127321265","https://openalex.org/W2337699331","https://openalex.org/W2496223032","https://openalex.org/W2570857834","https://openalex.org/W2604441257","https://openalex.org/W2753478887","https://openalex.org/W2763684087","https://openalex.org/W2789383461","https://openalex.org/W2794744449","https://openalex.org/W2794992746","https://openalex.org/W2883307502","https://openalex.org/W2885899032","https://openalex.org/W2886331223","https://openalex.org/W2901157366","https://openalex.org/W2927543040","https://openalex.org/W2929299477","https://openalex.org/W2930721377","https://openalex.org/W2933883078","https://openalex.org/W2942625968","https://openalex.org/W2943748428","https://openalex.org/W2953215929","https://openalex.org/W2953520354","https://openalex.org/W2954228300","https://openalex.org/W2955439455","https://openalex.org/W2955972181","https://openalex.org/W2964938167","https://openalex.org/W2968152713","https://openalex.org/W3016185124","https://openalex.org/W3136762838","https://openalex.org/W3139495538","https://openalex.org/W3207470659","https://openalex.org/W3214111992","https://openalex.org/W6600040955","https://openalex.org/W6637777816","https://openalex.org/W6723270624","https://openalex.org/W6743674419","https://openalex.org/W6753726376","https://openalex.org/W6754022011","https://openalex.org/W6755140418","https://openalex.org/W6766726536","https://openalex.org/W6766922533"],"related_works":["https://openalex.org/W2622138879","https://openalex.org/W840624224","https://openalex.org/W2564850588","https://openalex.org/W2348912413","https://openalex.org/W2123619123","https://openalex.org/W1486731751","https://openalex.org/W840375602","https://openalex.org/W2367644348","https://openalex.org/W2386471507","https://openalex.org/W2355263805"],"abstract_inverted_index":{"Major":[0],"operating":[1],"system":[2],"kernels":[3],"expose":[4],"twin":[5,45,98],"functions,":[6],"which":[7],"are":[8,27,138],"groups":[9],"of":[10],"internal":[11],"primitives":[12,33,123],"that":[13,114,143],"have":[14,55,177],"mostly":[15],"common":[16],"but":[17],"slightly":[18],"diverging":[19],"semantics,":[20],"to":[21,29,49,62,93,145],"kernel":[22,77,135],"modules":[23],"and":[24,65,80,95,132,156,171,185],"subsystems.":[25],"They":[26],"created":[28],"make":[30],"the":[31,73,76,97,109,116,122,128,134,139,150,154,182,191],"basic":[32],"work":[34],"well":[35,84],"in":[36,51,190],"various":[37],"scenarios.":[38],"Unfortunately,":[39],"though":[40],"being":[41],"expected":[42],"as":[43,83,85],"solutions,":[44],"functions":[46],"may":[47],"turn":[48],"problem-makers":[50],"practice.":[52],"As":[53],"we":[54,91,103],"observed":[56],"from":[57,72,118,153,166],"over":[58],"500":[59],"patches":[60,155,179],"applied":[61],"upstream":[63,192],"Linux":[64,183,193],"FreeBSD,":[66],"developers":[67],"choose":[68],"an":[69,105],"improper":[70],"one":[71],"twins,":[74],"leaving":[75],"with":[78,124,159],"stability":[79],"security":[81,130],"bugs":[82],"error-prone":[86],"code.":[87],"In":[88],"this":[89],"paper,":[90],"aim":[92],"understand":[94],"mitigate":[96],"function":[99,173],"misuse":[100],"problem.":[101],"First,":[102],"provide":[104],"informative":[106],"discussion":[107],"on":[108],"misuse-fix":[110],"patches.":[111],"We":[112,147,176],"find":[113],"violating":[115],"constraints":[117],"calling":[119],"context,":[120],"missing":[121],"better":[125],"performance,":[126],"lacking":[127],"necessary":[129],"enhancements,":[131],"breaking":[133],"coding":[136],"style":[137],"four":[140],"major":[141],"factors":[142],"lead":[144],"misuse.":[146],"then":[148],"identify":[149],"programming":[151],"rules":[152],"apply":[157],"them":[158],"a":[160],"static":[161],"program":[162],"analysis":[163],"tool":[164],"extended":[165],"Coccinelle,":[167],"including":[168],"callgraph":[169],"tainting":[170],"type-based":[172],"pointer":[174],"resolving.":[175],"136":[178],"accepted":[180],"by":[181],"community":[184],"fix":[186],"320":[187],"new":[188],"misuses":[189],"kernel.":[194]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
