{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T10:48:40Z","timestamp":1776077320108,"version":"3.50.1"},"reference-count":44,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1109\/sp46215.2023.10179298","type":"proceedings-article","created":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T17:18:15Z","timestamp":1689959895000},"page":"3262-3278","source":"Crossref","is-referenced-by-count":24,"title":["SyzDescribe: Principled, Automated, Static Generation of Syscall Descriptions for Kernel Drivers"],"prefix":"10.1109","author":[{"given":"Yu","family":"Hao","sequence":"first","affiliation":[{"name":"University of California,Riverside"}]},{"given":"Guoren","family":"Li","sequence":"additional","affiliation":[{"name":"University of California,Riverside"}]},{"given":"Xiaochen","family":"Zou","sequence":"additional","affiliation":[{"name":"University of California,Riverside"}]},{"given":"Weiteng","family":"Chen","sequence":"additional","affiliation":[{"name":"University of California,Riverside"}]},{"given":"Shitong","family":"Zhu","sequence":"additional","affiliation":[{"name":"University of California,Riverside"}]},{"given":"Zhiyun","family":"Qian","sequence":"additional","affiliation":[{"name":"University of California,Riverside"}]},{"given":"Ardalan Amiri","family":"Sani","sequence":"additional","affiliation":[{"name":"University of California,Irvine"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"syzkaller","year":"2022"},{"key":"ref2","volume-title":"Syzbot","year":"2022"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510126"},{"key":"ref4","volume-title":"Syzlang","year":"2022"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409686"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134069"},{"key":"ref7","first-page":"351","article-title":"{KSG}: Augmenting kernel fuzzing with system call specification generation","volume-title":"2022 USENIX Annual Technical Conference (USENIX ATC 22)","author":"Sun"},{"key":"ref8","volume-title":"Syzdescribe","year":"2023"},{"key":"ref9","volume-title":"Syzdescribe_syscall_description","year":"2023"},{"key":"ref10","volume-title":"Driver basics","year":"2021"},{"key":"ref11","volume-title":"Linux device drivers","author":"Rubini","year":"2001"},{"key":"ref12","first-page":"291","article-title":"Charm: Facilitating dynamic analysis of device drivers of mobile systems","volume-title":"27th USENIX Security Symposium, USENIX Security 2018, Baltimore, MD, USA, August 15-17, 2018","author":"Talebi"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2021NGP0005"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/cgo.2004.1281665"},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2020.24018","article-title":"HFL: hybrid fuzzing on the linux kernel","volume-title":"27th Annual Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA, February 23-26, 2020","author":"Kim"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484798"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354244"},{"key":"ref20","first-page":"1205","article-title":"Pex: A permission check analysis framework for linux kernel","volume-title":"28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019","author":"Zhang"},{"key":"ref21","volume-title":"stable-5.4-kasan.config","year":"2022"},{"key":"ref22","volume-title":"Hwaddresssanitizer","year":"2022"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243804"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484564"},{"key":"ref25","first-page":"729","article-title":"Moonshine: Optimizing OS fuzzer seed selection with trace distillation","volume-title":"27th USENIX Security Symposium, USENIX Security 2018, Baltimore, MD, USA, August 15-17, 2018","author":"Pailoor"},{"key":"ref26","first-page":"2741","article-title":"Syzvegas: Beating kernel fuzzing odds with reinforcement learning","volume-title":"30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021","author":"Wang"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3477132.3483547"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359662"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23176"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534226"},{"key":"ref31","first-page":"781","article-title":"FUZE: Towards facilitating exploit generation for kernel Use-After-Free vulnerabilities","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Wu"},{"key":"ref32","first-page":"1093","article-title":"KOOBE: towards facilitating exploit generation of kernel out-of-bounds write vulnerabilities","volume-title":"29th USENIX Security Symposium, USENIX Security 2020, August 12-14, 2020","author":"Chen"},{"key":"ref33","first-page":"3201","article-title":"Syzscope: Revealing high-risk security impacts of fuzzer-exposed bugs in linux kernel","volume-title":"31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022","author":"Zou"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23218"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.30"},{"key":"ref36","first-page":"2381","article-title":"Undo workarounds for kernel bugs","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Talebi"},{"key":"ref37","article-title":"Linkrid: Vetting imbalance reference counting in linux kernel with symbolic execution","volume-title":"31th USENIX Security Symposium, USENIX Security 2022","author":"Liu"},{"key":"ref38","article-title":"Static detection of unsafe DMA accesses in device drivers","volume-title":"Proc. USENIX Security Symposium","author":"Bai"},{"key":"ref39","first-page":"1007","article-title":"DR. CHECKER: A soundy analysis for linux kernel drivers","volume-title":"26th USENIX Security Symposium, USENIX Security 2017, Vancouver, BC, Canada, August 16-18, 2017","author":"Machiry"},{"key":"ref40","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2018.23326","article-title":"K-miner: Uncovering memory corruption in linux","volume-title":"25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, February 18-21, 2018","author":"Gens"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815422"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/502059.502042"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1961296.1950401"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2954679.2872364"},{"key":"ref45","article-title":"A Single-Machine Disk-Based Graph System for Interprocedural Static Analyses of Large-scale Systems Code","volume-title":"Proc. ACM ASPLOS","author":"Wang"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.24380"}],"event":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","location":"San Francisco, CA, USA","start":{"date-parts":[[2023,5,21]]},"end":{"date-parts":[[2023,5,25]]}},"container-title":["2023 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10179215\/10179280\/10179298.pdf?arnumber=10179298","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,20]],"date-time":"2024-07-20T05:11:17Z","timestamp":1721452277000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10179298\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/sp46215.2023.10179298","relation":{},"subject":[],"published":{"date-parts":[[2023,5]]}}}