{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T18:15:38Z","timestamp":1770228938546,"version":"3.49.0"},"reference-count":20,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2023,10,21]],"date-time":"2023-10-21T00:00:00Z","timestamp":1697846400000},"content-version":"vor","delay-in-days":293,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Procedia Computer Science"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1016\/j.procs.2023.10.509","type":"journal-article","created":{"date-parts":[[2023,11,25]],"date-time":"2023-11-25T11:56:18Z","timestamp":1700913378000},"page":"119-127","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":6,"special_numbering":"C","title":["Rust's Memory Safety Model: An Evaluation of Its Effectiveness in Preventing Common Vulnerabilities"],"prefix":"10.1016","volume":"227","author":[{"given":"Oey","family":"Kevin Andrian Santoso","sequence":"first","affiliation":[]},{"given":"Catherine","family":"Kwee","sequence":"additional","affiliation":[]},{"given":"William","family":"Chua","sequence":"additional","affiliation":[]},{"given":"Ghinaa Zain","family":"Nabiilah","sequence":"additional","affiliation":[]},{"family":"Rojali","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.procs.2023.10.509_bib0001","unstructured":"G. McGraw. Software Security. https:\/\/www.ccs.neu.edu\/home\/lieber\/courses\/csg379\/f04\/lectures\/SoftwareSecurity.pdf."},{"key":"10.1016\/j.procs.2023.10.509_bib0002","unstructured":"Bonner A, Labuda A, Kallai A, Bujalski A. Memory Safety. Available from: https:\/\/www.chromium.org\/Home\/chromium-security\/memory-safety\/."},{"key":"10.1016\/j.procs.2023.10.509_bib0003","unstructured":"Cimpanu C. Microsoft: 70 percent of all security bugs are memory safety issues. 2019. Available from: https:\/\/www.zdnet.com\/article\/microsoft-70-percent-of-all-security-bugs-are-memory-safety-issues\/."},{"key":"10.1016\/j.procs.2023.10.509_bib0004","series-title":"The meaning of memory safety","author":"de","year":"2018"},{"key":"10.1016\/j.procs.2023.10.509_bib0005","unstructured":"The rust programming language. Available from: https:\/\/doc.rust-lang.org\/beta\/book\/ch04-01-what-is-ownership.html."},{"key":"10.1016\/j.procs.2023.10.509_bib0006","unstructured":"Weiss A, Gierczak O, Patterson D, Ahmed A. Oxide: The Essence of Rust. 2021 Oct 19; doi:https:\/\/arxiv.org\/pdf\/1903.00982.pdf."},{"key":"10.1016\/j.procs.2023.10.509_bib0007","unstructured":"Jung R. Understanding and Evolving the Rust Programming Language. 2020 Aug. Available From: https:\/\/publikationen.sulb.uni-saarland.de\/bitstream\/20.500.11880\/29647\/2\/thesis-screen.pdf."},{"key":"10.1016\/j.procs.2023.10.509_bib0008","unstructured":"Donovan R. Why the developers who use Rust love it so much. 2020. Available from: https:\/\/stackoverflow.blog\/2020\/06\/05\/why-the-developers-who-use-rust-love-it-so-much\/."},{"key":"10.1016\/j.procs.2023.10.509_bib0009","unstructured":"Stack overflow developer survey 2020. Most Loved, Dreaded, and Wanted Languages. 2020. Available from: https:\/\/insights.stackoverflow.com\/survey\/2020technology-most-loved-dreaded-and-wanted-languages-loved."},{"key":"10.1016\/j.procs.2023.10.509_bib0010","doi-asserted-by":"crossref","unstructured":"Jung R, Jourdan J-H, Krebbers R, Dreyer D. Rustbelt: Securing the foundations of the rust programming language. Proceedings of the ACM on Programming Languages. 2017 Dec 27;2(POPL):1\u201334. https:\/\/dl.acm.org\/doi\/10.1145\/315815 .","DOI":"10.1145\/3158154"},{"key":"10.1016\/j.procs.2023.10.509_bib0011","unstructured":"Bugden, W., Alahmar, A. Rust: The Programming Language for Safety and Performance. IGSCONG\u201922. 2022. Available from: https:\/\/arxiv.org\/ftp\/arxiv\/papers\/2206\/2206.05503.pdf ."},{"issue":"1","key":"10.1016\/j.procs.2023.10.509_bib0012","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3466642","article-title":"Memory-Safety Challenge considered solved? an in-depth study with all Rust Cves","volume":"31","author":"Xu","year":"2021","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"10.1016\/j.procs.2023.10.509_bib0013","unstructured":"K. R. Fulton, A. Chan, D. Votipka, M. Hicks, M. L. Mazurek. Benefits and Drawbacks of Adopting a Secure Programming Language: Rust as a Case Study. 2021. Available from: https:\/\/obj.umiacs.umd.edu\/securitypapers\/Rust_as_Case_Study.pdf."},{"issue":"4","key":"10.1016\/j.procs.2023.10.509_bib0014","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1145\/3418295","article-title":"Safe Programming in rust","volume":"64","author":"Jung","year":"2021","journal-title":"Communications of the ACM"},{"key":"10.1016\/j.procs.2023.10.509_bib0015","unstructured":"Rust survey 2021 results: Rust blog. Available from: https:\/\/blog.rust-lang.org\/2022\/02\/15\/Rust-Survey-2021.html."},{"key":"10.1016\/j.procs.2023.10.509_bib0016","unstructured":"zKevz. zKevz\/Rust-vs-C-Comparison: Rust vs C++ comparison data for Research. Available from: https:\/\/github.com\/zKevz\/Rust-vs-C-Comparison."},{"key":"10.1016\/j.procs.2023.10.509_bib0017","series-title":"Proceedings of the 16th Workshop on Hot Topics in Operating Systems","article-title":"System programming in rust","author":"Balasubramanian","year":"2017"},{"key":"10.1016\/j.procs.2023.10.509_bib0018","article-title":"Rust programming language in the high-performance computing environment","author":"Sudwoj","year":"2021","journal-title":"ETH Zurich"},{"key":"10.1016\/j.procs.2023.10.509_bib0019","series-title":"Proceedings of the ACM SIGOPS 28th Symposium on Operating Systems Principles","author":"Bae","year":"2021"},{"key":"10.1016\/j.procs.2023.10.509_bib0020","unstructured":"Bonner A, Labuda A, Kallai A, Bujalski A. Memory Safety. Available from: https:\/\/www.chromium.org\/Home\/chromium-security\/memory-safety\/rust-and-c-interoperability\/."}],"container-title":["Procedia Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050923016757?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050923016757?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T02:39:51Z","timestamp":1761791991000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1877050923016757"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":20,"alternative-id":["S1877050923016757"],"URL":"https:\/\/doi.org\/10.1016\/j.procs.2023.10.509","relation":{},"ISSN":["1877-0509"],"issn-type":[{"value":"1877-0509","type":"print"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Rust's Memory Safety Model: An Evaluation of Its Effectiveness in Preventing Common Vulnerabilities","name":"articletitle","label":"Article Title"},{"value":"Procedia Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.procs.2023.10.509","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}