{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T03:54:57Z","timestamp":1743134097474,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030808242"},{"type":"electronic","value":"9783030808259"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-80825-9_10","type":"book-chapter","created":{"date-parts":[[2021,7,8]],"date-time":"2021-07-08T23:38:40Z","timestamp":1625787520000},"page":"194-214","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Third-Eye: Practical and Context-Aware Inference of Causal Relationship Violations in Commodity Kernels"],"prefix":"10.1007","author":[{"given":"Chuhong","family":"Yuan","sequence":"first","affiliation":[]},{"given":"Dong","family":"Du","sequence":"additional","affiliation":[]},{"given":"Haibo","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,9]]},"reference":[{"key":"10_CR1","unstructured":"Code of include\/linux\/workqueue.h in linux 5.3. https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/torvalds\/linux.git\/tree\/inclu de\/linux\/workqueue.h?h=v5.3"},{"key":"10_CR2","unstructured":"Code of kernel\/workqueue.c in linux 5.3. https:\/\/git.kernel.org\/pub\/scm\/linux\/ker nel\/git\/torvalds\/linux.git\/tree\/kernel\/workqueue.c?h=v5.3"},{"key":"10_CR3","doi-asserted-by":"publisher","unstructured":"Bai, J., Liu, H., Wang, Y., Hu, S.: Runtime checking for paired functions in device drivers. In: 2014 21st Asia-Pacific Software Engineering Conference, vol. 1, pp. 407\u2013414, December 2014. https:\/\/doi.org\/10.1109\/APSEC.2014.66","DOI":"10.1109\/APSEC.2014.66"},{"key":"10_CR4","doi-asserted-by":"publisher","unstructured":"Bai, J., Wang, Y., Liu, H., Hu, S.: Automated resource release in device drivers. In: 2015 IEEE 26th International Symposium on Software Reliability Engineering (ISSRE), pp. 172\u2013182, November 2015. https:\/\/doi.org\/10.1109\/ISSRE.2015.7381811","DOI":"10.1109\/ISSRE.2015.7381811"},{"key":"10_CR5","doi-asserted-by":"publisher","unstructured":"Bai, J.J., Lawall, J., Tan, W., Hu, S.M.: DCNS: automated detection of conservative non-sleep defects in the Linux kernel. In: Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS 2019, New York, NY, USA, pp. 287\u2013299. ACM (2019). https:\/\/doi.org\/10.1145\/3297858.3304065. http:\/\/doi.acm.org\/10.1145\/3297858.3304065","DOI":"10.1145\/3297858.3304065"},{"key":"10_CR6","unstructured":"Bai, J.J., Wang, Y.P., Lawall, J., Hu, S.M.: DSAC: Effective static analysis of sleep-in-atomic-context bugs in kernel modules. In: 2018 USENIX Annual Technical Conference (USENIX ATC 2018), Boston, MA, pp. 587\u2013600. USENIX Association, July 2018. https:\/\/www.usenix.org\/conference\/atc18\/presentation\/bai"},{"key":"10_CR7","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.infsof.2016.01.018","volume":"73","author":"JJ Bai","year":"2016","unstructured":"Bai, J.J., Wang, Y.P., Liu, H.Q., Hu, S.M.: Mining and checking paired functions in device drivers using characteristic fault injection. Inf. Softw. Technol. 73, 122\u2013133 (2016)","journal-title":"Inf. Softw. Technol."},{"key":"10_CR8","unstructured":"Bai, J.J., Wang, Y.P., Yin, J., Hu, S.M.: Testing error handling code in device drivers using characteristic fault injection. In: 2016 USENIX Annual Technical Conference (USENIX ATC 2016), Denver, CO, pp. 635\u2013647. USENIX Association, June 2016. https:\/\/www.usenix.org\/conference\/atc16\/technical-sessions\/presentation\/bai"},{"key":"10_CR9","doi-asserted-by":"publisher","unstructured":"Corina, J., et al.: Difuze: interface aware fuzzing for kernel drivers. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, New York, NY, USA, pp. 2123\u20132138. ACM (2017). https:\/\/doi.org\/10.1145\/3133956.3134069. http:\/\/doi.acm.org\/10.1145\/3133956.3134069","DOI":"10.1145\/3133956.3134069"},{"key":"10_CR10","doi-asserted-by":"publisher","unstructured":"Cui, H., Hu, G., Wu, J., Yang, J.: Verifying systems rules using rule-directed symbolic execution. In: Proceedings of the Eighteenth International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS 2013, New York, NY, USA, pp. 329\u2013342. ACM (2013). https:\/\/doi.org\/10.1145\/2451116.2451152. http:\/\/doi.acm.org\/10.1145\/2451116.2451152","DOI":"10.1145\/2451116.2451152"},{"key":"10_CR11","doi-asserted-by":"publisher","unstructured":"Engler, D., Chen, D.Y., Hallem, S., Chou, A., Chelf, B.: Bugs as deviant behavior: a general approach to inferring errors in systems code. In: Proceedings of the Eighteenth ACM Symposium on Operating Systems Principles, SOSP 2001, New York, NY, USA, pp. 57\u201372. ACM (2001). https:\/\/doi.org\/10.1145\/502034.502041. http:\/\/doi.acm.org\/10.1145\/502034.502041","DOI":"10.1145\/502034.502041"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Gens, D., Schmitt, S., Davi, L., Sadeghi, A.R.: K-miner: Uncovering memory corruption in Linux. In: NDSS (2018)","DOI":"10.14722\/ndss.2018.23326"},{"key":"10_CR13","doi-asserted-by":"publisher","unstructured":"Gu, Z., Wu, J., Li, C., Zhou, M., Jiang, Y., Gu, M., Sun, J.: Vetting API usages in c programs with imchecker. In: 2019 IEEE\/ACM 41st International Conference on Software Engineering: Companion Proceedings (ICSE-Companion), pp. 91\u201394, May 2019. https:\/\/doi.org\/10.1109\/ICSE-Companion.2019.00046","DOI":"10.1109\/ICSE-Companion.2019.00046"},{"key":"10_CR14","doi-asserted-by":"publisher","unstructured":"Lawall, J.L., Brunel, J., Palix, N., Hansen, R.R., Stuart, H., Muller, G.: Wysiwib: a declarative approach to finding API protocols and bugs in linux code. In: 2009 IEEE\/IFIP International Conference on Dependable Systems Networks, pp. 43\u201352, June 2009. https:\/\/doi.org\/10.1109\/DSN.2009.5270354","DOI":"10.1109\/DSN.2009.5270354"},{"key":"10_CR15","doi-asserted-by":"publisher","unstructured":"Lawall, J.L., Muller, G., Palix, N.: Enforcing the use of API functions in linux code. In: Proceedings of the 8th Workshop on Aspects, Components, and Patterns for Infrastructure Software, ACP4IS 2009, New York, NY, USA, pp. 7\u201312. ACM (2009). https:\/\/doi.org\/10.1145\/1509276.1509279. http:\/\/doi.acm.org\/10.1145\/1509276.1509279","DOI":"10.1145\/1509276.1509279"},{"key":"10_CR16","doi-asserted-by":"publisher","unstructured":"Li, Z., Zhou, Y.: PR-Miner: automatically extracting implicit programming rules and detecting violations in large software code. In: Proceedings of the 10th European Software Engineering Conference Held Jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering, ESEC\/FSE-13, New York, NY, USA, pp. 306\u2013315. ACM (2005). https:\/\/doi.org\/10.1145\/1081706.1081755. http:\/\/doi.acm.org\/10.1145\/1081706.1081755","DOI":"10.1145\/1081706.1081755"},{"key":"10_CR17","doi-asserted-by":"publisher","unstructured":"Liu, H., Bai, J., Wang, Y., Bian, Z., Hu, S.: PairMiner: mining for paired functions in kernel extensions. In: 2015 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS), pp. 93\u2013101, March 2015. https:\/\/doi.org\/10.1109\/ISPASS.2015.7095788","DOI":"10.1109\/ISPASS.2015.7095788"},{"key":"10_CR18","doi-asserted-by":"publisher","unstructured":"Liu, H., Bai, J., Wang, Y., Hu, S.: BP-Miner: mining paired functions from the binary code of drivers for error handling. In: 2014 21st Asia-Pacific Software Engineering Conference, vol. 1, pp. 415\u2013422, December 2014. https:\/\/doi.org\/10.1109\/APSEC.2014.67","DOI":"10.1109\/APSEC.2014.67"},{"key":"10_CR19","doi-asserted-by":"publisher","unstructured":"Liu, H., Wang, Y., Jiang, L., Hu, S.: PF-Miner: a new paired functions mining method for android kernel in error paths. In: 2014 IEEE 38th Annual Computer Software and Applications Conference, pp. 33\u201342, July 2014. https:\/\/doi.org\/10.1109\/COMPSAC.2014.10","DOI":"10.1109\/COMPSAC.2014.10"},{"key":"10_CR20","unstructured":"Lu, K., Pakki, A., Wu, Q.: Detecting missing-check bugs via semantic- and context-aware criticalness and constraints inferences. In: 28th USENIX Security Symposium (USENIX Security 2019), Santa Clara, CA, pp. 1769\u20131786. USENIX Association, August 2019. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/lu"},{"key":"10_CR21","unstructured":"Machiry, A., Spensky, C., Corina, J., Stephens, N., Kruegel, C., Vigna, G.: Dr. checker: a soundy analysis for linux kernel drivers. In: Proceedings of the 26th USENIX Conference on Security Symposium, SEC 2017, Berkeley, CA, USA, pp. 1007\u20131024. USENIX Association (2017). http:\/\/dl.acm.org\/citation.cfm?id=3241189.3241268"},{"key":"10_CR22","doi-asserted-by":"publisher","unstructured":"Min, C., Kashyap, S., Lee, B., Song, C., Kim, T.: Cross-checking semantic correctness: the case of finding file system bugs. In: Proceedings of the 25th Symposium on Operating Systems Principles, SOSP 2015, New York, NY, USA, pp. 361\u2013377. ACM (2015). https:\/\/doi.org\/10.1145\/2815400.2815422. http:\/\/doi.acm.org\/10.1145\/2815400.2815422","DOI":"10.1145\/2815400.2815422"},{"key":"10_CR23","doi-asserted-by":"publisher","unstructured":"Monperrus, M., Mezini, M.: Detecting missing method calls as violations of the majority rule. ACM Trans. Softw. Eng. Methodol. 22(1), 7:1\u20137:25 (2013). https:\/\/doi.org\/10.1145\/2430536.2430541. http:\/\/doi.acm.org\/10.1145\/2430536.2430541","DOI":"10.1145\/2430536.2430541"},{"key":"10_CR24","unstructured":"Schumilo, S., Aschermann, C., Gawlik, R., Schinzel, S., Holz, T.: KAFL: hardware-assisted feedback fuzzing for OS kernels. In: Proceedings of the 26th USENIX Conference on Security Symposium, SEC 2017, Berkeley, CA, USA, pp. 167\u2013182. USENIX Association (2017). http:\/\/dl.acm.org\/citation.cfm?id=3241189.3241204"},{"key":"10_CR25","doi-asserted-by":"publisher","unstructured":"Wang, W., Lu, K., Yew, P.C.: Check it again: detecting lacking-recheck bugs in OS kernels. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, New York, NY, USA, pp. 1899\u20131913. ACM (2018). https:\/\/doi.org\/10.1145\/3243734.3243844. http:\/\/doi.acm.org\/10.1145\/3243734.3243844","DOI":"10.1145\/3243734.3243844"},{"key":"10_CR26","doi-asserted-by":"publisher","unstructured":"Wu, Q., Liang, G., Wang, Q., Xie, T., Mei, H.: Iterative mining of resource-releasing specifications. In: Proceedings of the 2011 26th IEEE\/ACM International Conference on Automated Software Engineering, ASE 2011, Washington, DC, USA, pp. 233\u2013242. IEEE Computer Society (2011). https:\/\/doi.org\/10.1109\/ASE.2011.6100058","DOI":"10.1109\/ASE.2011.6100058"},{"key":"10_CR27","doi-asserted-by":"publisher","unstructured":"Xu, M., Qian, C., Lu, K., Backes, M., Kim, T.: Precise and scalable detection of double-fetch bugs in OS kernels. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 661\u2013678, May 2018. https:\/\/doi.org\/10.1109\/SP.2018.00017","DOI":"10.1109\/SP.2018.00017"},{"key":"10_CR28","doi-asserted-by":"publisher","unstructured":"Yang, J., Evans, D., Bhardwaj, D., Bhat, T., Das, M.: Perracotta: mining temporal API rules from imperfect traces. In: Proceedings of the 28th International Conference on Software Engineering, ICSE 2006, New York, NY, USA, pp. 282\u2013291. ACM (2006). https:\/\/doi.org\/10.1145\/1134285.1134325. http:\/\/doi.acm.org\/10.1145\/1134285.1134325","DOI":"10.1145\/1134285.1134325"},{"key":"10_CR29","unstructured":"Yun, I., Min, C., Si, X., Jang, Y., Kim, T., Naik, M.: APISan: sanitizing API usages through semantic cross-checking. In: Proceedings of the 25th USENIX Conference on Security Symposium, SEC 2016, Berkeley, CA, USA, pp. 363\u2013378. USENIX Association (2016). http:\/\/dl.acm.org\/citation.cfm?id=3241094.3241123"}],"container-title":["Lecture Notes in Computer Science","Detection of Intrusions and Malware, and Vulnerability Assessment"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-80825-9_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,5]],"date-time":"2021-08-05T09:07:36Z","timestamp":1628154456000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-80825-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030808242","9783030808259"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-80825-9_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"9 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DIMVA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dimva2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dimva2021.campus.ciencias.ulisboa.pt\/cfp.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"HotCRP","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"65","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}