2020
DOI: 10.1109/tr.2019.2902171
|View full text |Cite
|
Sign up to set email alerts
|

An Empirical Study of Regression Bug Chains in Linux

Abstract: This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 41 publications
0
3
0
Order By: Relevance
“…Although the secure boot loader requires functionalities such as the management of TEE, secure networking, secure storage, and self-update, they are easily enabled by the small Linux. Linux is also well maintained [1,51,99,105], offers a kernel self protection mechanism [32,33,54], and can be small in size [57,61,65,80]. From the view of Trusted Computing Base (TCB), these features are perhaps more important than the size of code.…”
Section: Contributions and Challengesmentioning
confidence: 99%
See 1 more Smart Citation
“…Although the secure boot loader requires functionalities such as the management of TEE, secure networking, secure storage, and self-update, they are easily enabled by the small Linux. Linux is also well maintained [1,51,99,105], offers a kernel self protection mechanism [32,33,54], and can be small in size [57,61,65,80]. From the view of Trusted Computing Base (TCB), these features are perhaps more important than the size of code.…”
Section: Contributions and Challengesmentioning
confidence: 99%
“…Most IoTs run a few domain-specific applications, mostly on Linux, due to the availability of many development tools on Linux. Although the Linux kernel itself is well maintained, and bugs are often fixed quickly [1,51,99,105] (e.g., for Meltdown [66,67] and Spectre [58,59]), most Linux IoT devices are not updated accordingly, and become an easy target of attacks. Notable example attacks include: Mirai [9,60], Linux.Darlloz [19,108], BASHLITE [70], and Hajime [34].…”
Section: Introductionmentioning
confidence: 99%
“…To better understand the characteristics of faults, researchers in recent years have tried to explore the characteristics of faults from real systems [22,[24][25][26][27]. Generally, software faults can classified by the following three dimensions: root cause, impact, and software component.…”
Section: Introductionmentioning
confidence: 99%