{"id":"https://openalex.org/W3212033785","doi":"https://doi.org/10.1145/3460120.3484738","title":"CPscan: Detecting Bugs Caused by Code Pruning in IoT Kernels","display_name":"CPscan: Detecting Bugs Caused by Code Pruning in IoT Kernels","publication_year":2021,"publication_date":"2021-11-12","ids":{"openalex":"https://openalex.org/W3212033785","doi":"https://doi.org/10.1145/3460120.3484738","mag":"3212033785"},"language":"en","primary_location":{"id":"doi:10.1145/3460120.3484738","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3460120.3484738","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020816561","display_name":"Lirong Fu","orcid":"https://orcid.org/0000-0002-0754-9245"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Lirong Fu","raw_affiliation_strings":["Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058611515","display_name":"Shouling Ji","orcid":"https://orcid.org/0000-0003-4268-372X"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shouling Ji","raw_affiliation_strings":["Zhejiang University &amp; Binjiang Institute of Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University &amp; Binjiang Institute of Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043198742","display_name":"Kangjie Lu","orcid":"https://orcid.org/0000-0002-4763-7354"},"institutions":[{"id":"https://openalex.org/I130238516","display_name":"University of Minnesota","ror":"https://ror.org/017zqws13","country_code":"US","type":"education","lineage":["https://openalex.org/I130238516"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kangjie Lu","raw_affiliation_strings":["University of Minnesota, Minneapolis, MN, USA"],"affiliations":[{"raw_affiliation_string":"University of Minnesota, Minneapolis, MN, USA","institution_ids":["https://openalex.org/I130238516"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100716210","display_name":"Peiyu Liu","orcid":"https://orcid.org/0000-0001-7793-7633"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peiyu Liu","raw_affiliation_strings":["Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101722406","display_name":"Xuhong Zhang","orcid":"https://orcid.org/0000-0002-8571-9780"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuhong Zhang","raw_affiliation_strings":["Zhejiang University &amp; Binjiang Institute of Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University &amp; Binjiang Institute of Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039424136","display_name":"Yuxuan Duan","orcid":null},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuxuan Duan","raw_affiliation_strings":["Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102008204","display_name":"Zihui Zhang","orcid":"https://orcid.org/0000-0002-7071-4792"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zihui Zhang","raw_affiliation_strings":["Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101562847","display_name":"Wenzhi Chen","orcid":"https://orcid.org/0000-0003-1674-4701"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenzhi Chen","raw_affiliation_strings":["Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101053493","display_name":"Yanjun Wu","orcid":"https://orcid.org/0000-0002-1823-0459"},"institutions":[{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanjun Wu","raw_affiliation_strings":["Institute of Software, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Software, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5020816561"],"corresponding_institution_ids":["https://openalex.org/I76130692"],"apc_list":null,"apc_paid":null,"fwci":0.5439,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.73364033,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"794","last_page":"810"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8576769828796387},{"id":"https://openalex.org/keywords/pruning","display_name":"Pruning","score":0.6216286420822144},{"id":"https://openalex.org/keywords/linux-kernel","display_name":"Linux kernel","score":0.6041717529296875},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5468615293502808},{"id":"https://openalex.org/keywords/kernel","display_name":"Kernel (algebra)","score":0.522259533405304},{"id":"https://openalex.org/keywords/personalization","display_name":"Personalization","score":0.48486408591270447},{"id":"https://openalex.org/keywords/pointer","display_name":"Pointer (user interface)","score":0.46639320254325867},{"id":"https://openalex.org/keywords/memory-leak","display_name":"Memory leak","score":0.42808419466018677},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.4218592941761017},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.3878368139266968},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.37441980838775635},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.35583722591400146},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.26700931787490845},{"id":"https://openalex.org/keywords/memory-management","display_name":"Memory management","score":0.22041630744934082},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.10465118288993835}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8576769828796387},{"id":"https://openalex.org/C108010975","wikidata":"https://www.wikidata.org/wiki/Q500094","display_name":"Pruning","level":2,"score":0.6216286420822144},{"id":"https://openalex.org/C553261973","wikidata":"https://www.wikidata.org/wiki/Q14579","display_name":"Linux kernel","level":2,"score":0.6041717529296875},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5468615293502808},{"id":"https://openalex.org/C74193536","wikidata":"https://www.wikidata.org/wiki/Q574844","display_name":"Kernel (algebra)","level":2,"score":0.522259533405304},{"id":"https://openalex.org/C183003079","wikidata":"https://www.wikidata.org/wiki/Q1000371","display_name":"Personalization","level":2,"score":0.48486408591270447},{"id":"https://openalex.org/C150202949","wikidata":"https://www.wikidata.org/wiki/Q107602","display_name":"Pointer (user interface)","level":2,"score":0.46639320254325867},{"id":"https://openalex.org/C156731835","wikidata":"https://www.wikidata.org/wiki/Q751740","display_name":"Memory leak","level":4,"score":0.42808419466018677},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.4218592941761017},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3878368139266968},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.37441980838775635},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.35583722591400146},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.26700931787490845},{"id":"https://openalex.org/C176649486","wikidata":"https://www.wikidata.org/wiki/Q2308807","display_name":"Memory management","level":3,"score":0.22041630744934082},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.10465118288993835},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C136085584","wikidata":"https://www.wikidata.org/wiki/Q910289","display_name":"Overlay","level":2,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C6557445","wikidata":"https://www.wikidata.org/wiki/Q173113","display_name":"Agronomy","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3460120.3484738","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3460120.3484738","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.5400000214576721}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":53,"referenced_works":["https://openalex.org/W1457363419","https://openalex.org/W1480909796","https://openalex.org/W1972466226","https://openalex.org/W1974032838","https://openalex.org/W2027256755","https://openalex.org/W2043118292","https://openalex.org/W2051658231","https://openalex.org/W2065489029","https://openalex.org/W2069661885","https://openalex.org/W2091939272","https://openalex.org/W2114345296","https://openalex.org/W2130200371","https://openalex.org/W2131135493","https://openalex.org/W2132574561","https://openalex.org/W2153578567","https://openalex.org/W2180277119","https://openalex.org/W2180970301","https://openalex.org/W2286236884","https://openalex.org/W2496223032","https://openalex.org/W2532962075","https://openalex.org/W2538805569","https://openalex.org/W2574811269","https://openalex.org/W2576376563","https://openalex.org/W2604441257","https://openalex.org/W2749008552","https://openalex.org/W2766078762","https://openalex.org/W2766898821","https://openalex.org/W2782780792","https://openalex.org/W2793974819","https://openalex.org/W2794670092","https://openalex.org/W2844405045","https://openalex.org/W2891748016","https://openalex.org/W2964938167","https://openalex.org/W2965536399","https://openalex.org/W2965717902","https://openalex.org/W2968152713","https://openalex.org/W2972595880","https://openalex.org/W3007106047","https://openalex.org/W3007127028","https://openalex.org/W3007413911","https://openalex.org/W3018354080","https://openalex.org/W3048512654","https://openalex.org/W3093568213","https://openalex.org/W3102768552","https://openalex.org/W3105926539","https://openalex.org/W3108766814","https://openalex.org/W3128535025","https://openalex.org/W3145042860","https://openalex.org/W3190986239","https://openalex.org/W4210759690","https://openalex.org/W4234407387","https://openalex.org/W4240590466","https://openalex.org/W4301168982"],"related_works":["https://openalex.org/W4236256518","https://openalex.org/W4234061252","https://openalex.org/W2053474257","https://openalex.org/W2350581606","https://openalex.org/W170027565","https://openalex.org/W2366816174","https://openalex.org/W2479380548","https://openalex.org/W2503646522","https://openalex.org/W1982231409","https://openalex.org/W2271479963"],"abstract_inverted_index":{"To":[0],"reduce":[1],"the":[2,14,28,32,36,51,88,98,114,118,121],"development":[3],"costs,":[4],"IoT":[5,10,42,75,123],"vendors":[6,43],"tend":[7],"to":[8,27,56],"construct":[9],"kernels":[11,76],"by":[12,71],"customizing":[13],"Linux":[15,33],"kernel.":[16,124],"Code":[17],"pruning":[18,52,73],"is":[19,77,104],"common":[20],"in":[21,50,74],"this":[22],"customization":[23],"process.":[24],"However,":[25],"due":[26],"intrinsic":[29],"complexity":[30],"of":[31,38,101,120],"kernel":[34],"and":[35,63,95,117],"lack":[37],"long-term":[39],"effective":[40],"maintenance,":[41],"may":[44],"mistakenly":[45],"delete":[46],"necessary":[47],"security":[48,90,99],"operations":[49,91],"process,":[53],"which":[54],"leads":[55],"various":[57],"bugs":[58,69],"such":[59],"as":[60],"memory":[61],"leakage":[62],"NULL":[64],"pointer":[65],"dereference.":[66],"Yet":[67],"detecting":[68],"caused":[70],"code":[72],"difficult.":[78],"Specifically,":[79],"(1)":[80],"a":[81,102],"significant":[82],"structural":[83],"change":[84],"makes":[85],"precisely":[86],"locating":[87],"deleted":[89],"(DSO":[92],")":[93],"difficult,":[94],"(2)":[96],"inferring":[97],"impact":[100],"DSO":[103],"not":[105],"trivial":[106],"since":[107],"it":[108],"requires":[109],"complex":[110],"semantic":[111],"understanding,":[112],"including":[113],"developing":[115],"logic":[116],"context":[119],"corresponding":[122]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":3},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
