Submitted:
04 February 2026
Posted:
05 February 2026
You are already at the latest version
Abstract
Keywords:
1. Introduction
2. Materials and Methods
2.1. Sample Collection and Study Area
2.2. Experimental Design and Control Conditions
2.3. Measurement Procedures and Quality Control
2.4. Data Processing and Model Formulation
2.5. Ethical and Operational Considerations
3. Results and Discussion
3.1. Verification Coverage and Distribution of Violations
3.2. Types of Incorrect Permission Transitions
3.3. Effects of Policy Corrections on Attack Scenarios
3.4. Comparison with Previous Work and Study Limitations
4. Conclusions
References
- Zehra, S.; Syed, H. J.; Samad, F.; Faseeha, U.; Ahmed, H.; Khan, M. K. Securing the shared kernel: Exploring kernel isolation and emerging challenges in modern cloud computing. IEEE Access 2024, 12, 179281–179317. [Google Scholar] [CrossRef]
- Mao, Y.; Chang, K. M.; Chen, Z. Research on Frontend-Backend Collaboration and Performance Optimization for High-Concurrency Web Systems. 2026. [Google Scholar]
- Novković, B. Improving Monolithic Operating System Kernel Security and Robustness Through Kernel Subsystem Isolation. Doctoral dissertation, University of Zagreb. Faculty of Electrical Engineering and Computing. Department of Electronics, Microelectronics, Computer and Intelligent Systems, 2025. [Google Scholar]
- Bai, W.; Xuan, K.; Huang, P.; Wu, Q.; Wen, J.; Wu, J.; Lu, K. Apilot: Navigating large language models to generate secure code by sidestepping outdated api pitfalls. arXiv 2024, arXiv:2409.16526. [Google Scholar] [CrossRef]
- Kuzuno, H.; Yamauchi, T. Kdpm: Kernel data protection mechanism using a memory protection key. In International Workshop on Security; Springer International Publishing: Cham, August 2022; pp. 66–84. [Google Scholar]
- Mao, Y.; Chen, Z.; Ma, X. Research on a Lightweight Full-Stack Edge Execution Optimization Framework Based on Serverless and WebAssembly. 2026. [Google Scholar] [CrossRef]
- Kressel, J. A.; Lefeuvre, H.; Olivier, P. μFork: Supporting POSIX fork Within a Single-Address-Space OS. In Proceedings of the ACM SIGOPS 31st Symposium on Operating Systems Principles, 2025, October; pp. 18–35. [Google Scholar]
- Jarkas, O.; Ko, R.; Dong, N.; Mahmud, R. A Container Security Survey: Exploits, Attacks, and Defenses. ACM Computing Surveys 2025, 57(7), 1–36. [Google Scholar] [CrossRef]
- Du, Y. Research on Deep Learning Models for Forecasting Cross-Border Trade Demand Driven by Multi-Source Time-Series Data. Journal of Science, Innovation & Social Impact 2025, 1(2), 63–70. [Google Scholar]
- Schneider, M.; Masti, R. J.; Shinde, S.; Capkun, S.; Perez, R. Sok: Hardware-supported trusted execution environments. arXiv 2022, arXiv:2205.12742. [Google Scholar]
- Lim, S. Y.; Agrawal, S.; Han, X.; Eyers, D.; O'Keeffe, D.; Pasquier, T. Securing Monolithic Kernels using Compartmentalization. arXiv 2024, arXiv:2404.08716. [Google Scholar] [CrossRef]
- Hu, W. Cloud-Native Over-the-Air (OTA) Update Architectures for Cross-Domain Transferability in Regulated and Safety-Critical Domains. 2025 6th International Conference on Information Science, Parallel and Distributed Systems, 2025, September. [Google Scholar]
- Azar, K. Z.; Hossain, M. M.; Vafaei, A.; Al Shaikh, H.; Mondol, N. N.; Rahman, F.; Farahmandi, F. Fuzz, penetration, and ai testing for soc security verification: Challenges and solutions. In Cryptology ePrint Archive; 2022. [Google Scholar]
- Yang, M.; Wang, Y.; Shi, J.; Tong, L. Reinforcement Learning Based Multi-Stage Ad Sorting and Personalized Recommendation System Design. 2025. [Google Scholar] [PubMed]
- Winderix, H.; Piessens, F.; Daniel, L. A. Efficient Enforcement Mechanisms for the Preservation of Control-Flow Confidentiality. 2024. [Google Scholar]
- Peng, H.; Jin, X.; Huang, Q.; Liu, S. E-commerce Intelligent Recommendation Optimization and Personalized Marketing Strategy Based on Big Model. 2025. [Google Scholar] [CrossRef]
- Bhushan, R. C.; Yadav, D. K. A survey on formal verification of separation kernels. Recent Advances in Computer Science and Communications (Formerly: Recent Patents on Computer Science) 2022, 15(6), 832–850. [Google Scholar] [CrossRef]
- Buchhold, M.; Mueller, T.; Diehl, S. Revealing measurement-induced phase transitions by pre-selection. arXiv 2022, arXiv:2208.10506. [Google Scholar] [CrossRef]
- Du, Y. Research on Digital Quality Traceability System for Temperature-Controlled Supply Chain of Foreign Trade Wine Driven by Blockchain and IoT. Business and Social Sciences Proceedings 2025, 4, 57–65. [Google Scholar]
- Ducasse, Q. Hardware security for just-in-time compilation in language virtual machines. Doctoral dissertation, ENSTA Bretagne-École nationale supérieure de techniques avancées Bretagne, 2024. [Google Scholar]
- Liu, S.; Feng, H.; Liu, X. A Study on the Mechanism of Generative Design Tools' Impact on Visual Language Reconstruction: An Interactive Analysis of Semantic Mapping and User Cognition. Authorea Preprints 2025. [Google Scholar]


Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).