{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T06:40:27Z","timestamp":1774680027527,"version":"3.50.1"},"reference-count":47,"publisher":"IEEE","license":[{"start":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T00:00:00Z","timestamp":1770076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T00:00:00Z","timestamp":1770076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026,2,3]]},"DOI":"10.1109\/icce67443.2026.11449875","type":"proceedings-article","created":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T19:47:50Z","timestamp":1774640870000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Memory Safety in Linux Device Drivers: Enhancing Security with Formal Verification"],"prefix":"10.1109","author":[{"given":"Janislley O.","family":"Sousa","sequence":"first","affiliation":[{"name":"Federal University of Amazonas (UFAM),SIDIA Institute of Science and Technology,Manaus,Brazil"}]},{"given":"David A. O.","family":"Ferreira","sequence":"additional","affiliation":[{"name":"Federal University of Amazonas (UFAM),SIDIA Institute of Science and Technology,Manaus,Brazil"}]},{"given":"Eddie B. De Lima","family":"Filho","sequence":"additional","affiliation":[{"name":"Federal University of Amazonas,TPV Technology,Manaus,Brazil"}]},{"given":"Lucas C.","family":"Cordeiro","sequence":"additional","affiliation":[{"name":"Federal University of Amazonas, The University of Manchester (UoM),Manaus,Brazil"}]}],"member":"263","reference":[{"key":"ref1","article-title":"The more you know, the more you know you don\u2019t know","year":"2022"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2023.3236542"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-021-00379-x"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.5753\/sast.2024.3703"},{"key":"ref5","article-title":"An update on memory safety in chrome","year":"2021"},{"key":"ref6","article-title":"The more you know, the more you know you don\u2019t know","author":"Stoep","year":"2025"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.5753\/sbseg_estendido.2023.235802"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.59"},{"key":"ref9","article-title":"Linux kernel security vulnerabilities","year":"2025"},{"key":"ref10","article-title":"Linux kernel cves","author":"Luedtke","year":"2024"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3672452"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3272833"},{"key":"ref13","article-title":"Coverity scan: Static analysis service for open-source projects","year":"2025"},{"key":"ref14","article-title":"Coverity scan static analysis"},{"key":"ref15","first-page":"601","article-title":"Coccinelle: 10 years of automated evolution in the linux kernel","volume-title":"USENIX ATC","author":"Lawall"},{"key":"ref16","first-page":"163","article-title":"Improving integer security for systems with {KINT}","volume-title":"10th USENIX Symposium on Operating Systems Design and Implementation (OSDI 12)","author":"Wang"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978366"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409686"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23326"},{"key":"ref20","first-page":"1769","article-title":"Detecting {Missing-Check} bugs via semantic-and {Context-Aware} criticalness and constraints inferences","volume-title":"28th USENIX Security Symposium","author":"Lu"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24416"},{"key":"ref22","first-page":"2041","article-title":"Understanding and detecting disordered error handling with precise function pairing","volume-title":"30th USENIX Security Symposium","author":"Wu"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2872362.2872389"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417256"},{"key":"ref25","article-title":"Valgrind: Tool Suite for Debugging and Profiling Linux Programs","year":"2025"},{"key":"ref26","article-title":"AddressSanitizer","year":"2024"},{"key":"ref27","article-title":"UndefinedBehaviorSanitizer","year":"2025"},{"key":"ref28","article-title":"KASAN","year":"2025"},{"key":"ref29","article-title":"KCSAN","year":"2025"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2023.042361"},{"key":"ref31","article-title":"Syzkaller","author":"Vyukov"},{"key":"ref32","article-title":"KCOV","year":"2025"},{"key":"ref33","article-title":"syzbot"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134103"},{"key":"ref35","first-page":"729","article-title":"{MoonShine}: Optimizing {OS} fuzzer seed selection with trace distillation","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Pailoor"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24018"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134069"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00017"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00078"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00035"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23176"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24730-2_15"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-020-00571-2"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/11513988_13"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/1181195.1181215"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629596"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3223359"}],"event":{"name":"2026 IEEE International Conference on Consumer Electronics (ICCE)","location":"Dubai, United Arab Emirates","start":{"date-parts":[[2026,2,3]]},"end":{"date-parts":[[2026,2,5]]}},"container-title":["2026 IEEE International Conference on Consumer Electronics (ICCE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11449575\/11449585\/11449875.pdf?arnumber=11449875","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T05:13:26Z","timestamp":1774674806000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11449875\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,3]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/icce67443.2026.11449875","relation":{},"subject":[],"published":{"date-parts":[[2026,2,3]]}}}