{"id":"https://openalex.org/W3112762811","doi":"https://doi.org/10.1145/3474123.3486762","title":"Automating Seccomp Filter Generation for Linux Applications","display_name":"Automating Seccomp Filter Generation for Linux Applications","publication_year":2021,"publication_date":"2021-11-05","ids":{"openalex":"https://openalex.org/W3112762811","doi":"https://doi.org/10.1145/3474123.3486762","mag":"3112762811"},"language":"en","primary_location":{"id":"doi:10.1145/3474123.3486762","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3474123.3486762","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 on Cloud Computing Security Workshop","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2012.02554","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089762779","display_name":"Claudio Canella","orcid":null},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":true,"raw_author_name":"Claudio Canella","raw_affiliation_strings":["Graz University of Technology, Graz, Austria"],"affiliations":[{"raw_affiliation_string":"Graz University of Technology, Graz, Austria","institution_ids":["https://openalex.org/I4092182"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049878313","display_name":"Mario Werner","orcid":null},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Mario Werner","raw_affiliation_strings":["Graz University of Technology, Graz, Austria"],"affiliations":[{"raw_affiliation_string":"Graz University of Technology, Graz, Austria","institution_ids":["https://openalex.org/I4092182"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066874310","display_name":"Daniel Gruss","orcid":"https://orcid.org/0000-0002-7977-3246"},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Daniel Gruss","raw_affiliation_strings":["Graz University of Technology, Graz, Austria"],"affiliations":[{"raw_affiliation_string":"Graz University of Technology, Graz, Austria","institution_ids":["https://openalex.org/I4092182"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070469078","display_name":"Michael Schwarz","orcid":"https://orcid.org/0000-0001-6744-3410"},"institutions":[{"id":"https://openalex.org/I4210128801","display_name":"Helmholtz Center for Information Security","ror":"https://ror.org/02njgxr09","country_code":"DE","type":"facility","lineage":["https://openalex.org/I1305996414","https://openalex.org/I4210128801"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Michael Schwarz","raw_affiliation_strings":["CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany"],"affiliations":[{"raw_affiliation_string":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany","institution_ids":["https://openalex.org/I4210128801"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5089762779"],"corresponding_institution_ids":["https://openalex.org/I4092182"],"apc_list":null,"apc_paid":null,"fwci":0.42,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.67356571,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"139","last_page":"151"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9843000173568726,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8437533378601074},{"id":"https://openalex.org/keywords/compiler","display_name":"Compiler","score":0.8357857465744019},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5795059204101562},{"id":"https://openalex.org/keywords/binary-number","display_name":"Binary number","score":0.5503402352333069},{"id":"https://openalex.org/keywords/installation","display_name":"Installation","score":0.5293605923652649},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5232447981834412},{"id":"https://openalex.org/keywords/usable","display_name":"USable","score":0.5041681528091431},{"id":"https://openalex.org/keywords/filter","display_name":"Filter (signal processing)","score":0.4964812397956848},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.43776410818099976},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.40548068284988403},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3797687292098999},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.0955481231212616}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8437533378601074},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.8357857465744019},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5795059204101562},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.5503402352333069},{"id":"https://openalex.org/C146778888","wikidata":"https://www.wikidata.org/wiki/Q836862","display_name":"Installation","level":2,"score":0.5293605923652649},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5232447981834412},{"id":"https://openalex.org/C2780615836","wikidata":"https://www.wikidata.org/wiki/Q2471869","display_name":"USable","level":2,"score":0.5041681528091431},{"id":"https://openalex.org/C106131492","wikidata":"https://www.wikidata.org/wiki/Q3072260","display_name":"Filter (signal processing)","level":2,"score":0.4964812397956848},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.43776410818099976},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.40548068284988403},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3797687292098999},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.0955481231212616},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0}],"mesh":[],"locations_count":7,"locations":[{"id":"doi:10.1145/3474123.3486762","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3474123.3486762","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 on Cloud Computing Security Workshop","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2012.02554","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2012.02554","pdf_url":"https://arxiv.org/pdf/2012.02554","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},{"id":"mag:3112762811","is_oa":true,"landing_page_url":"https://arxiv.org/pdf/2012.02554.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"arXiv (Cornell University)","raw_type":null},{"id":"pmh:oai:figshare.com:article/24613749","is_oa":true,"landing_page_url":"https://figshare.com/articles/conference_contribution/Automating_Seccomp_Filter_Generation_for_Linux_Applications/24613749","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},{"id":"doi:10.48550/arxiv.2012.02554","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2012.02554","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"},{"id":"doi:10.60882/cispa.24613749","is_oa":true,"landing_page_url":"https://doi.org/10.60882/cispa.24613749","pdf_url":null,"source":{"id":"https://openalex.org/S7407050916","display_name":"CISPA Helmholtz Center","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"},{"id":"doi:10.60882/cispa.24613749.v1","is_oa":true,"landing_page_url":"https://doi.org/10.60882/cispa.24613749.v1","pdf_url":null,"source":{"id":"https://openalex.org/S7407050916","display_name":"CISPA Helmholtz Center","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2012.02554","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2012.02554","pdf_url":"https://arxiv.org/pdf/2012.02554","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4956428346","display_name":null,"funder_award_id":"Horizon 2020 research and innovatio","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G5036817778","display_name":null,"funder_award_id":"European Union's Horizon 2020 research and innov","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G523495190","display_name":"Securing Software against Physical Attacks","funder_award_id":"681402","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G5399556803","display_name":null,"funder_award_id":"This project has received funding from the Europea","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G5925048831","display_name":null,"funder_award_id":"681402","funder_id":"https://openalex.org/F4320334678","funder_display_name":"European Research Council"},{"id":"https://openalex.org/G8318064016","display_name":null,"funder_award_id":"Horizon","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G8633428685","display_name":null,"funder_award_id":"European Union's Horizon 2020 research and innovat","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"}],"funders":[{"id":"https://openalex.org/F4320307102","display_name":"Intel Corporation","ror":"https://ror.org/01ek73717"},{"id":"https://openalex.org/F4320316514","display_name":"Arm","ror":"https://ror.org/04mmhzs81"},{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"},{"id":"https://openalex.org/F4320323031","display_name":"\u00d6sterreichische Forschungsf\u00f6rderungsgesellschaft","ror":"https://ror.org/028jc0449"},{"id":"https://openalex.org/F4320326047","display_name":"Amt der Steierm\u00e4rkischen Landesregierung","ror":null},{"id":"https://openalex.org/F4320334678","display_name":"European Research Council","ror":"https://ror.org/0472cxd90"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":53,"referenced_works":["https://openalex.org/W1112477","https://openalex.org/W24839522","https://openalex.org/W116894366","https://openalex.org/W1427174644","https://openalex.org/W1447175589","https://openalex.org/W1535810264","https://openalex.org/W1538332098","https://openalex.org/W1947347140","https://openalex.org/W1969501726","https://openalex.org/W1996931407","https://openalex.org/W2022018347","https://openalex.org/W2022292029","https://openalex.org/W2032493761","https://openalex.org/W2046699259","https://openalex.org/W2117798902","https://openalex.org/W2118382442","https://openalex.org/W2123886726","https://openalex.org/W2131135493","https://openalex.org/W2137979825","https://openalex.org/W2138381338","https://openalex.org/W2149237601","https://openalex.org/W2153185479","https://openalex.org/W2157116240","https://openalex.org/W2159216827","https://openalex.org/W2162800072","https://openalex.org/W2169768162","https://openalex.org/W2185952835","https://openalex.org/W2279059888","https://openalex.org/W2295044331","https://openalex.org/W2516285678","https://openalex.org/W2765363641","https://openalex.org/W2765403767","https://openalex.org/W2883613460","https://openalex.org/W2898525884","https://openalex.org/W2902718458","https://openalex.org/W2903017094","https://openalex.org/W2911234530","https://openalex.org/W2911594609","https://openalex.org/W2951328987","https://openalex.org/W2954241526","https://openalex.org/W2963311060","https://openalex.org/W2964590009","https://openalex.org/W2965270422","https://openalex.org/W2966437945","https://openalex.org/W2971395691","https://openalex.org/W2976763854","https://openalex.org/W2978239850","https://openalex.org/W2985879431","https://openalex.org/W2991611768","https://openalex.org/W3017716388","https://openalex.org/W3047802198","https://openalex.org/W3081770884","https://openalex.org/W3092347617"],"related_works":["https://openalex.org/W3200325357","https://openalex.org/W2776020178","https://openalex.org/W1576470049","https://openalex.org/W2042043230","https://openalex.org/W1814790149","https://openalex.org/W34197133","https://openalex.org/W3000074210","https://openalex.org/W2409892332","https://openalex.org/W2013941405","https://openalex.org/W2062227764","https://openalex.org/W1543865847","https://openalex.org/W2603355141","https://openalex.org/W2944790281","https://openalex.org/W3190904369","https://openalex.org/W657826166","https://openalex.org/W3011508236","https://openalex.org/W2922177954","https://openalex.org/W2794116118","https://openalex.org/W2739633556","https://openalex.org/W190163119"],"abstract_inverted_index":{"Software":[0],"vulnerabilities":[1],"undermine":[2],"the":[3,11],"security":[4],"of":[5,13,31],"applications.":[6],"By":[7],"blocking":[8],"unused":[9],"functionality,":[10],"impact":[12],"potential":[14],"exploits":[15],"can":[16],"be":[17],"reduced.":[18],"While":[19],"seccomp":[20],"provides":[21],"a":[22],"solution":[23],"for":[24,34],"filtering":[25],"syscalls,":[26],"it":[27],"requires":[28],"manual":[29],"implementation":[30],"filter":[32],"rules":[33],"each":[35],"individual":[36],"application.":[37],"Recent":[38],"work":[39],"has":[40],"investigated":[41],"approaches":[42,52],"to":[43],"automate":[44],"this":[45],"task.":[46],"However,":[47],"as":[48],"we":[49],"show,":[50],"these":[51],"make":[53],"assumptions":[54],"that":[55],"are":[56],"not":[57],"necessary":[58],"or":[59],"require":[60],"overly":[61],"time-consuming":[62],"analysis.":[63]},"counts_by_year":[{"year":2024,"cited_by_count":3}],"updated_date":"2026-04-13T07:58:08.660418","created_date":"2025-10-10T00:00:00"}
