{"id":"https://openalex.org/W7123346598","doi":"https://doi.org/10.1109/candarw68385.2025.00051","title":"vkFlow: Automated Identification of Vulnerable Kernel Function Related to System Call","display_name":"vkFlow: Automated Identification of Vulnerable Kernel Function Related to System Call","publication_year":2025,"publication_date":"2025-11-25","ids":{"openalex":"https://openalex.org/W7123346598","doi":"https://doi.org/10.1109/candarw68385.2025.00051"},"language":null,"primary_location":{"id":"doi:10.1109/candarw68385.2025.00051","is_oa":false,"landing_page_url":"https://doi.org/10.1109/candarw68385.2025.00051","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 Thirteenth International Symposium on Computing and Networking Workshops (CANDARW)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068194019","display_name":"Hiroki Kuzuno","orcid":"https://orcid.org/0000-0003-2686-2541"},"institutions":[{"id":"https://openalex.org/I65837984","display_name":"Kobe University","ror":"https://ror.org/03tgsfw79","country_code":"JP","type":"education","lineage":["https://openalex.org/I65837984"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Hiroki Kuzuno","raw_affiliation_strings":["Kobe University,Graduate School of Engineering,Kobe,Japan"],"affiliations":[{"raw_affiliation_string":"Kobe University,Graduate School of Engineering,Kobe,Japan","institution_ids":["https://openalex.org/I65837984"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087832192","display_name":"Toshihiro YAMAUCHI","orcid":null},"institutions":[{"id":"https://openalex.org/I163770644","display_name":"Okayama University","ror":"https://ror.org/02pc6pc55","country_code":"JP","type":"education","lineage":["https://openalex.org/I163770644"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Toshihiro Yamauchi","raw_affiliation_strings":["Okayama University,Faculty of Environmental, Life, Natural Science and Technology,Okayama,Japan"],"affiliations":[{"raw_affiliation_string":"Okayama University,Faculty of Environmental, Life, Natural Science and Technology,Okayama,Japan","institution_ids":["https://openalex.org/I163770644"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5068194019"],"corresponding_institution_ids":["https://openalex.org/I65837984"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.85824017,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"259","last_page":"266"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.8989999890327454,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.8989999890327454,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.05090000107884407,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.017799999564886093,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/sysfs","display_name":"sysfs","score":0.7864000201225281},{"id":"https://openalex.org/keywords/kernel","display_name":"Kernel (algebra)","score":0.7081000208854675},{"id":"https://openalex.org/keywords/configfs","display_name":"Configfs","score":0.630299985408783},{"id":"https://openalex.org/keywords/tree-kernel","display_name":"Tree kernel","score":0.5497999787330627},{"id":"https://openalex.org/keywords/graph-kernel","display_name":"Graph kernel","score":0.5436000227928162},{"id":"https://openalex.org/keywords/radial-basis-function-kernel","display_name":"Radial basis function kernel","score":0.5349000096321106},{"id":"https://openalex.org/keywords/polynomial-kernel","display_name":"Polynomial kernel","score":0.490200012922287},{"id":"https://openalex.org/keywords/call-graph","display_name":"Call graph","score":0.4763999879360199},{"id":"https://openalex.org/keywords/kernel-smoother","display_name":"Kernel smoother","score":0.46630001068115234}],"concepts":[{"id":"https://openalex.org/C90307666","wikidata":"https://www.wikidata.org/wiki/Q1932562","display_name":"sysfs","level":3,"score":0.7864000201225281},{"id":"https://openalex.org/C74193536","wikidata":"https://www.wikidata.org/wiki/Q574844","display_name":"Kernel (algebra)","level":2,"score":0.7081000208854675},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7059999704360962},{"id":"https://openalex.org/C94127936","wikidata":"https://www.wikidata.org/wiki/Q5160105","display_name":"Configfs","level":3,"score":0.630299985408783},{"id":"https://openalex.org/C140417398","wikidata":"https://www.wikidata.org/wiki/Q16933942","display_name":"Tree kernel","level":5,"score":0.5497999787330627},{"id":"https://openalex.org/C100595998","wikidata":"https://www.wikidata.org/wiki/Q11731931","display_name":"Graph kernel","level":5,"score":0.5436000227928162},{"id":"https://openalex.org/C75866337","wikidata":"https://www.wikidata.org/wiki/Q7280263","display_name":"Radial basis function kernel","level":4,"score":0.5349000096321106},{"id":"https://openalex.org/C160446489","wikidata":"https://www.wikidata.org/wiki/Q7226642","display_name":"Polynomial kernel","level":4,"score":0.490200012922287},{"id":"https://openalex.org/C102379954","wikidata":"https://www.wikidata.org/wiki/Q2589940","display_name":"Call graph","level":2,"score":0.4763999879360199},{"id":"https://openalex.org/C27406209","wikidata":"https://www.wikidata.org/wiki/Q6394203","display_name":"Kernel smoother","level":5,"score":0.46630001068115234},{"id":"https://openalex.org/C122280245","wikidata":"https://www.wikidata.org/wiki/Q620622","display_name":"Kernel method","level":3,"score":0.4374000132083893},{"id":"https://openalex.org/C134517425","wikidata":"https://www.wikidata.org/wiki/Q16000131","display_name":"Kernel embedding of distributions","level":4,"score":0.42879998683929443},{"id":"https://openalex.org/C55851704","wikidata":"https://www.wikidata.org/wiki/Q7623983","display_name":"String kernel","level":5,"score":0.42730000615119934},{"id":"https://openalex.org/C195699287","wikidata":"https://www.wikidata.org/wiki/Q7915722","display_name":"Variable kernel density estimation","level":4,"score":0.4259999990463257},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.39329999685287476},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.37119999527931213},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.33009999990463257},{"id":"https://openalex.org/C2778579508","wikidata":"https://www.wikidata.org/wiki/Q722192","display_name":"System call","level":2,"score":0.32249999046325684},{"id":"https://openalex.org/C553261973","wikidata":"https://www.wikidata.org/wiki/Q14579","display_name":"Linux kernel","level":2,"score":0.310699999332428},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.30820000171661377},{"id":"https://openalex.org/C168065819","wikidata":"https://www.wikidata.org/wiki/Q845566","display_name":"Debugging","level":2,"score":0.2741999924182892},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2702000141143799},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.263700008392334},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.2551000118255615},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.25270000100135803}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/candarw68385.2025.00051","is_oa":false,"landing_page_url":"https://doi.org/10.1109/candarw68385.2025.00051","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 Thirteenth International Symposium on Computing and Networking Workshops (CANDARW)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10","score":0.4317997395992279}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Attacks":[0],"on":[1,18],"the":[2,19,35,104,106,121,126,135,150,184,192],"operating":[3],"system":[4,12,95,122,179],"(OS)":[5],"kernel":[6,9,27,36,45,55,78,85,92,107,127,136,151,169,175,189],"exploit":[7],"vulnerable":[8,26,54,77,168],"functions":[10,86,93,170,176],"via":[11],"call":[13,96,115,123],"invocations.":[14],"When":[15],"investigating":[16],"attacks":[17],"kernel,":[20],"it":[21,48,162],"is":[22,49,110,117,163],"necessary":[23],"to":[24,51,82,91,144,157,165,178],"identify":[25,53,84,146,167],"functions.":[28],"In":[29,72,103,133],"analysis":[30,190],"using":[31,191],"eBPF":[32],"or":[33],"GDB,":[34],"function":[37,56,79,114,128,152],"name":[38],"and":[39,58,87,125,139,159,171],"virtual":[40,59,88,147,172],"address":[41,148],"are":[42,98,130,142],"required":[43,187],"for":[44,65,188],"investigation.":[46],"However,":[47],"difficult":[50],"manually":[52],"names":[57,129],"addresses":[60,89,173],"used":[61],"in":[62],"an":[63,101],"attack":[64],"a":[66,113],"large-scale":[67],"OS":[68],"such":[69],"as":[70],"Linux.":[71],"this":[73],"study,":[74],"we":[75],"propose":[76],"flow":[80],"(vkFlow)":[81],"automatically":[83,131,145,166],"related":[90,177],"of":[94],"that":[97],"called":[99],"during":[100],"attack.":[102],"vkFlow,":[105],"source":[108],"code":[109],"statically":[111],"analyzed,":[112],"graph":[116],"generated":[118],"starting":[119],"from":[120,149],"invocation,":[124],"identified.":[132],"addition,":[134],"debug":[137],"information":[138,141],"symbol":[140],"referenced":[143],"name.":[153],"We":[154,181],"applied":[155],"vkFlow":[156],"Linux":[158],"evaluated":[160],"whether":[161],"possible":[164],"among":[174],"calls.":[180],"also":[182],"measured":[183],"calculation":[185],"time":[186],"vkFlow.":[193]},"counts_by_year":[],"updated_date":"2026-01-14T00:46:21.520733","created_date":"2026-01-14T00:00:00"}
