{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T21:15:41Z","timestamp":1762377341797,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031265525"},{"type":"electronic","value":"9783031265532"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-26553-2_21","type":"book-chapter","created":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T11:33:31Z","timestamp":1676806411000},"page":"391-407","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Detecting API Missing-Check Bugs Through Complete Cross Checking of\u00a0Erroneous Returns"],"prefix":"10.1007","author":[{"given":"Qintao","family":"Shen","sequence":"first","affiliation":[]},{"given":"Hongyu","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Guozhu","family":"Meng","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yuqing","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,19]]},"reference":[{"key":"21_CR1","unstructured":"Gunawi, H.S., Rubio-Gonz\u00e1lez, C., Arpaci-Dusseau, A.C., Arpaci-Dusseau, R.H., Liblit, B.: EIO: error handling is occasionally correct. In: FAST, vol. 8, pp. 1\u201316 (2008)"},{"key":"21_CR2","doi-asserted-by":"crossref","unstructured":"Min, C., Kashyap, S., Lee, B., et al.: Cross-checking semantic correctness: the case of finding file system bugs. In: Proceedings of the 25th Symposium on Operating Systems Principles, pp. 361\u2013377 (2015)","DOI":"10.1145\/2815400.2815422"},{"key":"21_CR3","doi-asserted-by":"crossref","unstructured":"Nanda, M.G., Sinha, S.: Accurate interprocedural null-dereference analysis for Java. In: 2009 IEEE 31st International Conference on Software Engineering, pp. 133\u2013143. IEEE (2009)","DOI":"10.1109\/ICSE.2009.5070515"},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Rubio-Gonz\u00e1lez, C., Gunawi, H.S., Liblit, B., Arpaci-Dusseau, R.H., Arpaci-Dusseau, A.C.: Error propagation analysis for file systems. In: Proceedings of the 30th ACM SIGPLAN Conference on Programming Language Design and Implementation, pp. 270\u2013280 (2009)","DOI":"10.1145\/1542476.1542506"},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"Mao, J., Chen, Y., Xiao, Q., et al.: RID: finding reference count bugs with inconsistent path pair checking. In: Proceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 531\u2013544 (2016)","DOI":"10.1145\/2954680.2872389"},{"key":"21_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1007\/978-3-642-00593-0_25","volume-title":"Fundamental Approaches to Software Engineering","author":"M Acharya","year":"2009","unstructured":"Acharya, M., Xie, T.: Mining API error-handling specifications from source code. In: Chechik, M., Wirsing, M. (eds.) FASE 2009. LNCS, vol. 5503, pp. 370\u2013384. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-00593-0_25"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Zhong, H., Zhang, L., Xie, T., Mei, H.: Inferring resource specifications from natural language API documentation. In: 2009 IEEE\/ACM International Conference on Automated Software Engineering, pp. 307\u2013318. IEEE (2009)","DOI":"10.1109\/ASE.2009.94"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Min, C., Kashyap, S., Lee, B., Song, C., Kim, T.: Cross-checking semantic correctness: the case of finding file system bugs. In: Proceedings of the 25th Symposium on Operating Systems Principles. pp. 361\u2013377 (2015)","DOI":"10.1145\/2815400.2815422"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Kang, Y., Ray, B., Jana, S.: APEx: automated inference of error specifications for C APIs. In: Proceedings of the 31st IEEE\/ACM International Conference on Automated Software Engineering, pp. 472\u2013482 (2016)","DOI":"10.1145\/2970276.2970354"},{"key":"21_CR10","unstructured":"Jana, S., Kang, Y.J., Roth, S., Ray, B.: Automatically detecting error handling bugs using error specifications. In: 25th USENIX Security Symposium (USENIX Security 2016), pp. 345\u2013362 (2016)"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Wang, W., Lu, K., Yew, P.C.: Check it again: detecting lacking-recheck bugs in OS kernels. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 1899\u20131913 (2018)","DOI":"10.1145\/3243734.3243844"},{"key":"21_CR12","unstructured":"Yun, I., Min, C., Si, X., Jang, Y., Kim, T., Naik, M.: APISan: sanitizing API usages through semantic cross-checking. In: 25th USENIX Security Symposium (USENIX Security 2016), pp. 363\u2013378 (2016)"},{"key":"21_CR13","unstructured":"Zhang, T., Shen, W., Lee, D., Jung, C., Azab, A.M., Wang, R.: PeX: a permission check analysis framework for Linux kernel. In: 28th USENIX Security Symposium (USENIX Security 2019), pp. 1205\u20131220 (2019)"},{"key":"21_CR14","unstructured":"Lu, K., Pakki, A., Wu, Q.: Detecting missing-check bugs via semantic-and context-aware criticalness and constraints inferences. In: 28th USENIX Security Symposium (USENIX Security 2019), pp. 1769\u20131786 (2019)"},{"key":"21_CR15","unstructured":"https:\/\/cwe.mitre.org\/top25\/archive\/2021\/2021_cwe_top25.html"},{"key":"21_CR16","doi-asserted-by":"crossref","unstructured":"Lu, K., Hu, H.: Where does it go? Refining indirect-call targets with multi-layer type analysis. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 1867\u20131881 (2019)","DOI":"10.1145\/3319535.3354244"},{"key":"21_CR17","doi-asserted-by":"crossref","unstructured":"Pakki, A., Lu, K.: Exaggerated error handling hurts! an in-depth study and context-aware detection. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp. 1203\u20131218 (2020)","DOI":"10.1145\/3372297.3417256"},{"key":"21_CR18","unstructured":"Wu, Q., Pakki, A., Emamdoost, N., McCamant, S., Lu, K.: Understanding and detecting disordered error handling with precise function pairing. In: 30th USENIX Security Symposium (USENIX Security 2021), pp. 2041\u20132058 (2021)"},{"key":"21_CR19","unstructured":"Jiang, Z.M., Bai, J.J., Lu, K., Hu, S.M.: Fuzzing error handling code using context-sensitive software fault injection. In: 29th USENIX Security Symposium (USENIX Security 2020), pp. 2595\u20132612 (2020)"},{"key":"21_CR20","doi-asserted-by":"crossref","unstructured":"Tian, Y., Ray, B.: Automatically diagnosing and repairing error handling bugs in C. In: Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, pp. 752\u2013762 (2017)","DOI":"10.1145\/3106237.3106300"},{"key":"21_CR21","doi-asserted-by":"crossref","unstructured":"DeFreez, D., Baldwin, H.M., Rubio-Gonz\u00e1lez, C., Thakur, A.V.: Effective error-specification inference via domain-knowledge expansion. In: Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 466\u2013476 (2019)","DOI":"10.1145\/3338906.3338960"},{"key":"21_CR22","unstructured":"https:\/\/github.com\/travitch\/whole-program-llvm"},{"key":"21_CR23","unstructured":"Machiry, A., Spensky, C., Corina, J., Stephens, N., Kruegel, C., Vigna, G.: DR.CHECKER: a soundy analysis for Linux kernel drivers. In: 26th USENIX Security Symposium (USENIX Security 2017), pp. 1007\u20131024 (2017)"},{"key":"21_CR24","doi-asserted-by":"crossref","unstructured":"Deng, Z., Chen, K., Meng, G., Zhang, X., Xu, K., Cheng, Y.: Understanding real-world threats to deep learning models in Android apps. In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, pp. 785\u2013799 (2022)","DOI":"10.1145\/3548606.3559388"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-26553-2_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,4]],"date-time":"2023-04-04T12:17:48Z","timestamp":1680610668000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-26553-2_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031265525","9783031265532"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-26553-2_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"19 February 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Inscrypt","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security and Cryptology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Beijing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisc2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.sklois.cn\/inscrypt2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"68","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}