{"id":"https://openalex.org/W4402955715","doi":"https://doi.org/10.1145/3678890.3678891","title":"KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities","display_name":"KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities","publication_year":2024,"publication_date":"2024-09-29","ids":{"openalex":"https://openalex.org/W4402955715","doi":"https://doi.org/10.1145/3678890.3678891"},"language":"en","primary_location":{"id":"doi:10.1145/3678890.3678891","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3678890.3678891","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 27th International Symposium on Research in Attacks, Intrusions and Defenses","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3678890.3678891","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061371645","display_name":"Bonan Ruan","orcid":"https://orcid.org/0009-0004-5500-6060"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Bonan Ruan","raw_affiliation_strings":["National University of Singapore, Singapore"],"raw_orcid":"https://orcid.org/0009-0004-5500-6060","affiliations":[{"raw_affiliation_string":"National University of Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100347863","display_name":"Jiahao Liu","orcid":"https://orcid.org/0009-0007-0969-6891"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Jiahao Liu","raw_affiliation_strings":["National University of Singapore, Singapore"],"raw_orcid":"https://orcid.org/0009-0007-0969-6891","affiliations":[{"raw_affiliation_string":"National University of Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044106963","display_name":"Chuqi Zhang","orcid":"https://orcid.org/0009-0006-3550-696X"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Chuqi Zhang","raw_affiliation_strings":["National University of Singapore, Singapore"],"raw_orcid":"https://orcid.org/0009-0006-3550-696X","affiliations":[{"raw_affiliation_string":"National University of Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084611756","display_name":"Zhenkai Liang","orcid":"https://orcid.org/0000-0001-7138-5030"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Zhenkai Liang","raw_affiliation_strings":["National University of Singapore, Singapore"],"raw_orcid":"https://orcid.org/0000-0001-7138-5030","affiliations":[{"raw_affiliation_string":"National University of Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5061371645"],"corresponding_institution_ids":["https://openalex.org/I165932596"],"apc_list":null,"apc_paid":null,"fwci":2.6491,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.91295572,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"384","last_page":"402"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7442744374275208},{"id":"https://openalex.org/keywords/linux-kernel","display_name":"Linux kernel","score":0.6959480047225952},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.6761595606803894},{"id":"https://openalex.org/keywords/kernel","display_name":"Kernel (algebra)","score":0.6006985902786255},{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.5334691405296326},{"id":"https://openalex.org/keywords/sysfs","display_name":"sysfs","score":0.4401150941848755},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.36155539751052856},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.07759630680084229},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.06474220752716064}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7442744374275208},{"id":"https://openalex.org/C553261973","wikidata":"https://www.wikidata.org/wiki/Q14579","display_name":"Linux kernel","level":2,"score":0.6959480047225952},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.6761595606803894},{"id":"https://openalex.org/C74193536","wikidata":"https://www.wikidata.org/wiki/Q574844","display_name":"Kernel (algebra)","level":2,"score":0.6006985902786255},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.5334691405296326},{"id":"https://openalex.org/C90307666","wikidata":"https://www.wikidata.org/wiki/Q1932562","display_name":"sysfs","level":3,"score":0.4401150941848755},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.36155539751052856},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.07759630680084229},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.06474220752716064},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3678890.3678891","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3678890.3678891","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 27th International Symposium on Research in Attacks, Intrusions and Defenses","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3678890.3678891","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3678890.3678891","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 27th International Symposium on Research in Attacks, Intrusions and Defenses","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W2094619820","https://openalex.org/W2132897303","https://openalex.org/W2165597437","https://openalex.org/W2274324447","https://openalex.org/W2534610146","https://openalex.org/W2642053679","https://openalex.org/W2766898821","https://openalex.org/W2794659749","https://openalex.org/W2897668282","https://openalex.org/W2927543040","https://openalex.org/W2984993098","https://openalex.org/W2985831349","https://openalex.org/W3108020564","https://openalex.org/W3108766814","https://openalex.org/W3163483881","https://openalex.org/W3193830552","https://openalex.org/W3210943449","https://openalex.org/W4226043146","https://openalex.org/W4241778203","https://openalex.org/W4284709537","https://openalex.org/W4308642904","https://openalex.org/W4310025025","https://openalex.org/W4313191964","https://openalex.org/W4385080390","https://openalex.org/W4388856870","https://openalex.org/W4388858767"],"related_works":["https://openalex.org/W2912106162","https://openalex.org/W2354252607","https://openalex.org/W2349791335","https://openalex.org/W2364776537","https://openalex.org/W2614013133","https://openalex.org/W1530595791","https://openalex.org/W2393791030","https://openalex.org/W2123619123","https://openalex.org/W2388410831","https://openalex.org/W1922733741"],"abstract_inverted_index":{"Linux":[0],"kernel":[1,14,65,97,107],"vulnerability":[2,53,73],"reproduction":[3,68],"is":[4,42,54,58,69,112],"a":[5,13,52,106],"critical":[6],"task":[7],"in":[8,76,89],"system":[9],"security.":[10],"To":[11],"reproduce":[12],"vulnerability,":[15,108],"the":[16,20,33,38,63,72],"vulnerable":[17,48],"environment":[18,41,49],"and":[19,104],"Proof":[21],"of":[22,35,40],"Concept":[23],"(PoC)":[24],"program":[25],"are":[26],"needed.":[27],"Most":[28],"existing":[29],"research":[30],"focuses":[31],"on":[32,114],"generation":[34],"PoC,":[36],"while":[37],"construction":[39],"overlooked.":[43],"However,":[44],"establishing":[45],"an":[46],"effective":[47],"to":[50,60,102,116],"trigger":[51,105],"challenging.":[55],"Firstly,":[56],"it":[57],"hard":[59],"guarantee":[61],"that":[62],"selected":[64],"version":[66,74],"for":[67],"vulnerable,":[70],"as":[71],"claims":[75],"online":[77],"databases":[78],"can":[79],"occasionally":[80],"be":[81,87,100],"incorrect.":[82],"Secondly,":[83],"many":[84],"vulnerabilities":[85],"cannot":[86],"reproduced":[88],"kernels":[90],"built":[91],"with":[92],"default":[93],"configurations.":[94,119],"Intricate":[95],"non-default":[96],"configurations":[98],"must":[99],"set":[101],"include":[103],"but":[109],"less":[110],"information":[111],"available":[113],"how":[115],"recognize":[117],"these":[118]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
