Jianzhou Zhao, Qiang Wei, Xingwei Li, Yunchao Wang, Xixing Li
{"title":"ASIRDetector: Scheduling-driven, asynchronous execution to discover asynchronous improper releases bug in linux kernel","authors":"Jianzhou Zhao, Qiang Wei, Xingwei Li, Yunchao Wang, Xixing Li","doi":"10.1016/j.cose.2025.104530","DOIUrl":null,"url":null,"abstract":"<div><div>Asynchronous operations are the cornerstone of modern operating systems, enabling high-performance task scheduling and efficient resource management. However, if the asynchronous mechanism releases resources at incorrect times, it will pose significant security risks to the Linux kernel, such as high-risk vulnerabilities like use-after-free and null pointer dereferencing. Due to the indirect triggerability of asynchronous operations by users, existing methods for detecting kernel concurrency vulnerabilities are ineffective in identifying bugs arising from improper asynchronous resource releases.</div><div>In this paper, we present a method named ASIRDetector, which adopts a schedule-driven asynchronous execution control strategy to address the aforementioned challenges through a combination of static analysis and dynamic fuzz testing. Our method models the mainstream asynchronous mechanisms in the kernel and their entry points to ensure that dynamic fuzz testing is guided towards high-risk areas where such errors can be triggered. Additionally, we implement a deterministic thread control technique that precisely orchestrates the interleaving of asynchronous and regular instructions to maximize the detection of asynchronous concurrency errors.</div><div>We have developed a prototype of ASIRDetector, which successfully detected all 14 vulnerabilities in the test set, surpassing the performance of the current state-of-the-art methods. More notably, ASIRDetector discovered 15 unique bugs in Linux kernel version 6.9-rc7, highlighting its effectiveness in uncovering asynchronous improper release vulnerabilities.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"157 ","pages":"Article 104530"},"PeriodicalIF":4.8000,"publicationDate":"2025-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Security","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0167404825002196","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Asynchronous operations are the cornerstone of modern operating systems, enabling high-performance task scheduling and efficient resource management. However, if the asynchronous mechanism releases resources at incorrect times, it will pose significant security risks to the Linux kernel, such as high-risk vulnerabilities like use-after-free and null pointer dereferencing. Due to the indirect triggerability of asynchronous operations by users, existing methods for detecting kernel concurrency vulnerabilities are ineffective in identifying bugs arising from improper asynchronous resource releases.
In this paper, we present a method named ASIRDetector, which adopts a schedule-driven asynchronous execution control strategy to address the aforementioned challenges through a combination of static analysis and dynamic fuzz testing. Our method models the mainstream asynchronous mechanisms in the kernel and their entry points to ensure that dynamic fuzz testing is guided towards high-risk areas where such errors can be triggered. Additionally, we implement a deterministic thread control technique that precisely orchestrates the interleaving of asynchronous and regular instructions to maximize the detection of asynchronous concurrency errors.
We have developed a prototype of ASIRDetector, which successfully detected all 14 vulnerabilities in the test set, surpassing the performance of the current state-of-the-art methods. More notably, ASIRDetector discovered 15 unique bugs in Linux kernel version 6.9-rc7, highlighting its effectiveness in uncovering asynchronous improper release vulnerabilities.
期刊介绍:
Computers & Security is the most respected technical journal in the IT security field. With its high-profile editorial board and informative regular features and columns, the journal is essential reading for IT security professionals around the world.
Computers & Security provides you with a unique blend of leading edge research and sound practical management advice. It is aimed at the professional involved with computer security, audit, control and data integrity in all sectors - industry, commerce and academia. Recognized worldwide as THE primary source of reference for applied research and technical expertise it is your first step to fully secure systems.