{"id":"https://openalex.org/W2099242094","doi":"https://doi.org/10.1145/2414456.2414510","title":"Letting applications operate through attacks launched from compromised drivers","display_name":"Letting applications operate through attacks launched from compromised drivers","publication_year":2012,"publication_date":"2012-05-02","ids":{"openalex":"https://openalex.org/W2099242094","doi":"https://doi.org/10.1145/2414456.2414510","mag":"2099242094"},"language":"en","primary_location":{"id":"doi:10.1145/2414456.2414510","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2414456.2414510","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027504758","display_name":"Shengzhi Zhang","orcid":"https://orcid.org/0000-0001-9432-9779"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Shengzhi Zhang","raw_affiliation_strings":["Pennsylvania State University, University Park","Pennsylvania State University, University Park#TAB#"],"affiliations":[{"raw_affiliation_string":"Pennsylvania State University, University Park","institution_ids":["https://openalex.org/I130769515"]},{"raw_affiliation_string":"Pennsylvania State University, University Park#TAB#","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100346828","display_name":"Peng Liu","orcid":"https://orcid.org/0000-0002-5091-8464"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Peng Liu","raw_affiliation_strings":["Pennsylvania State University, University Park","Pennsylvania State University, University Park#TAB#"],"affiliations":[{"raw_affiliation_string":"Pennsylvania State University, University Park","institution_ids":["https://openalex.org/I130769515"]},{"raw_affiliation_string":"Pennsylvania State University, University Park#TAB#","institution_ids":["https://openalex.org/I130769515"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5027504758"],"corresponding_institution_ids":["https://openalex.org/I130769515"],"apc_list":null,"apc_paid":null,"fwci":0.4281,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.72847326,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"91","last_page":"92"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7043996453285217},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6999961137771606},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6732974052429199},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.48487386107444763},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.46850067377090454},{"id":"https://openalex.org/keywords/metadata","display_name":"Metadata","score":0.4475923478603363},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.4358236789703369},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.35986819863319397}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7043996453285217},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6999961137771606},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6732974052429199},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.48487386107444763},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.46850067377090454},{"id":"https://openalex.org/C93518851","wikidata":"https://www.wikidata.org/wiki/Q180160","display_name":"Metadata","level":2,"score":0.4475923478603363},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.4358236789703369},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.35986819863319397},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2414456.2414510","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2414456.2414510","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2247082803","display_name":null,"funder_award_id":"FA9550-07-1-0527 (MURI)","funder_id":"https://openalex.org/F4320338279","funder_display_name":"Air Force Office of Scientific Research"},{"id":"https://openalex.org/G3155045214","display_name":null,"funder_award_id":"FA8750-08-C-0137","funder_id":"https://openalex.org/F4320338294","funder_display_name":"Air Force Research Laboratory"},{"id":"https://openalex.org/G6286888568","display_name":null,"funder_award_id":"W911NF-09-1-0525 (MURI)W911NF1210055","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G8392500310","display_name":null,"funder_award_id":"CNS-0905131CNS-0916469","funder_id":"https://openalex.org/F4320337388","funder_display_name":"Division of Computer and Network Systems"}],"funders":[{"id":"https://openalex.org/F4320337388","display_name":"Division of Computer and Network Systems","ror":"https://ror.org/02rdzmk74"},{"id":"https://openalex.org/F4320338279","display_name":"Air Force Office of Scientific Research","ror":"https://ror.org/011e9bt93"},{"id":"https://openalex.org/F4320338281","display_name":"Army Research Office","ror":"https://ror.org/05epdh915"},{"id":"https://openalex.org/F4320338294","display_name":"Air Force Research Laboratory","ror":"https://ror.org/02e2egq70"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W2029448568","https://openalex.org/W2104145632","https://openalex.org/W2127321265"],"related_works":["https://openalex.org/W17155033","https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W4312814274","https://openalex.org/W1590307681","https://openalex.org/W1485337887","https://openalex.org/W2906845177","https://openalex.org/W4200107511","https://openalex.org/W2891427086","https://openalex.org/W1968625315"],"abstract_inverted_index":{"With":[0,112],"the":[1,10,45,51,55,73,94,96,100,105,109,113,117,140,143],"rapid":[2],"prevalence":[3],"of":[4,72,76,108,128,142],"E-Commerce,":[5],"MMO":[6],"and":[7,15,103],"social":[8],"networking,":[9],"demand":[11],"on":[12],"service":[13,52,129,144],"availability":[14],"continuity":[16],"is":[17],"increasingly":[18],"crucial":[19],"to":[20,43,98,116],"production":[21],"servers":[22],"or":[23,138],"data":[24],"centers.":[25],"Hence,":[26],"software":[27],"failure":[28],"recovery":[29],"systems":[30],"are":[31],"thoroughly":[32],"studied.":[33],"However,":[34],"stimulated":[35],"by":[36,49,131],"significant":[37],"commercial":[38],"revenue,":[39],"attackers":[40,95,124],"begin":[41],"trying":[42],"evade":[44],"existing":[46],"auditing/recovering":[47],"techniques":[48],"manipulating":[50,135],"applications":[53],"through":[54],"compromised":[56,110],"kernel.":[57],"Nowadays,":[58],"device":[59],"drivers":[60],"account":[61],"for":[62],"more":[63,84],"than":[64,87],"half":[65],"(could":[66],"be":[67],"as":[68,70],"high":[69],"70%)":[71],"source":[74],"code":[75,90],"most":[77],"commodity":[78],"operating":[79],"system":[80],"kernels,":[81],"with":[82],"much":[83],"exploitable":[85],"vulnerabilities":[86],"other":[88],"kernel":[89,106],"[2].":[91],"This":[92],"renders":[93],"opportunity":[97],"exploit":[99],"driver":[101,133],"vulnerability":[102],"leverage":[104],"privilege":[107],"drivers.":[111],"unrestricted":[114],"access":[115],"whole":[118],"(kernel/user)":[119],"memory":[120],"address":[121],"space,":[122],"successful":[123],"can":[125],"launch":[126],"denial":[127],"attack":[130],"incurring":[132],"fault,":[134],"critical":[136],"code/data":[137],"even":[139],"metadata":[141],"application":[145],"process.":[146]},"counts_by_year":[{"year":2017,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
