Zing Forum

Reading

VCAO: A Game Theory-Based Verifier-Centered Agent Orchestration System for Strategic Discovery of OS Vulnerabilities

This paper proposes the VCAO framework, which models OS vulnerability discovery as a Bayesian Stackelberg search game. It dynamically allocates analysis budgets via a large reasoning model orchestrator, combining verifiers like static analysis, fuzz testing, and memory detectors to achieve efficient automated vulnerability mining.

VCAO漏洞发现操作系统安全博弈论斯塔克尔伯格博弈智能体编排Linux内核自动化安全分析
Published 2026-04-09 22:27Recent activity 2026-04-10 10:28Estimated read 6 min
VCAO: A Game Theory-Based Verifier-Centered Agent Orchestration System for Strategic Discovery of OS Vulnerabilities
1

Section 01

[Introduction] VCAO: A Game Theory-Based Agent Orchestration System to Improve OS Vulnerability Discovery Efficiency

This paper proposes the VCAO (Verifier-Centered Agentic Orchestration) framework, which models OS vulnerability discovery as a Bayesian Stackelberg search game. It dynamically allocates analysis budgets via a large reasoning model orchestrator, combining verifiers like static analysis, fuzz testing, and memory detectors to achieve efficient automated vulnerability mining. The system performs excellently in Linux kernel vulnerability discovery, significantly outperforming existing methods.

2

Section 02

Background: Challenges and New Paradigms in OS Vulnerability Discovery

The OS kernel is the cornerstone of computing systems, but its large code size (e.g., Linux kernel has over 30 million lines) makes vulnerability discovery difficult. Traditional methods (static analysis, fuzz testing, symbolic execution) each have limitations: static analysis has high false positives, fuzz testing has limited coverage, and symbolic execution is constrained by path explosion. The rise of large language models brings new possibilities for vulnerability discovery, but it requires intelligent orchestration of heterogeneous tools to work together—thus VCAO was born.

3

Section 03

Methodology: Game Theory Modeling and Six-Layer Architecture Design

VCAO models vulnerability discovery as a repeated Bayesian Stackelberg search game: the defender (system) allocates budgets, the attacker looks for missed vulnerabilities, and Bayesian beliefs are updated over multiple rounds to adjust strategies. The system uses a six-layer architecture: Surface Mapping Layer (code structure analysis), Intra-Kernel Attack Graph Construction Layer (data flow/control flow dependencies), Game-Theoretic File/Function Ranking Layer (core decision-making, MILP for optimal allocation), Parallel Executor Agent Layer (manages verifier tool instances), Cascaded Verification Layer (cross-validation to reduce false positives), and Security Governance Layer (system monitoring).

4

Section 04

Evidence: Experimental Evaluation and Performance Comparison Results

Experiments were conducted on 5 Linux kernel subsystems: 1. Historical CVE Reproduction: Rediscovered 847 known CVEs; 2. Real-Time Discovery: Found 0-day vulnerabilities in the latest kernel snapshot. Performance comparison: Per unit budget, it found 2.7x more valid vulnerabilities than coverage-guided fuzz testing, 1.9x more than static analysis, and 1.4x more than non-game-theoretic multi-agent pipelines; false positive rate was reduced by 68%.

5

Section 05

Key Insights: Core Factors for VCAO's Efficiency

Key factors for VCAO's success: 1. Dynamic Adaptability: Adjust strategies based on real-time results; 2. Heterogeneous Tool Collaboration: Optimize complementary tool combinations; 3. Strategic Prioritization: Focus on high-risk components via attack graphs and Bayesian beliefs, ensuring resources are used where they matter most.

6

Section 06

Open Source Contributions and Future Outlook

The research team open-sourced the simulation framework, synthetic attack graph generator, and evaluation toolchain to facilitate reproduction, extension, and standardized evaluation. Limitations: Currently focused on Linux kernel, attack graphs rely on static analysis, and game parameters need calibration. Future directions: Extend to user-space applications, introduce more verifier tools, and explore collaboration between multiple VCAO instances.

7

Section 07

Conclusion: Significance of VCAO for the Vulnerability Discovery Field

VCAO combines game theory, Bayesian reasoning, and large language models to build an intelligent adaptive vulnerability discovery system. In today's era of severe cybersecurity threats, such automated tools can help security teams quickly locate risks and fix vulnerabilities proactively. AI will play an increasingly important role in the software security field.