{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T10:25:15Z","timestamp":1775039115776,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"DARPA","award":["FA8750-15-2-0084"],"award-info":[{"award-number":["FA8750-15-2-0084"]}]},{"name":"ONR","award":["N00014-15-1-2948, N00014-17-1-2011"],"award-info":[{"award-number":["N00014-15-1-2948, N00014-17-1-2011"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3134069","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"2123-2138","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":122,"title":["DIFUZE"],"prefix":"10.1145","author":[{"given":"Jake","family":"Corina","sequence":"first","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Aravind","family":"Machiry","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Christopher","family":"Salls","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Yan","family":"Shoshitaishvili","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"given":"Shuang","family":"Hao","sequence":"additional","affiliation":[{"name":"University of Texas at Dallas, Dallas, TX, USA"}]},{"given":"Christopher","family":"Kruegel","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Giovanni","family":"Vigna","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Alfred Aho Jeffrey Ullman Monica S. Lam and Ravi Sethi 1986. Compilers: Principles Techniques and Tools. \"Addison-Wesley\"."},{"key":"e_1_3_2_2_2_1","unstructured":"Dave Aitel. 2002. The Advantages of Block-Based Protocol Analysis for Security Testing. (2002). shownotehttps:\/\/www.immunitysec.com\/downloads\/advantages_of_block_based_analysis.html."},{"key":"e_1_3_2_2_3_1","unstructured":"ARM 2013. ARM Exception levels. (2013). shownotehttp:\/\/infocenter.arm.com\/help\/index.jsp?topic=\/com.arm.doc.ddi0488c\/CHDHJIJG.html."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"crossref","unstructured":"K. Ashcraft and D. Engler 2002. Using programmer-written compiler extensions to catch security holes Proceedings of the 2002 IEEE Symposium on Security and Privacy (SP '02). 143--159. 1007\/978--3--540--73210--5_27","DOI":"10.1109\/SECPRI.2002.1004368"},{"key":"e_1_3_2_2_5_1","unstructured":"LLVM Project. 2003. LLVM Bitcode File Format. (2003). shownotehttp:\/\/llvm.org\/docs\/BitCodeFormat.html."},{"key":"e_1_3_2_2_6_1","volume-title":"Raphael Ernani Rodrigues, and Victor Hugo Sperle Campos","author":"Quintao Pereira Fernando Magno","year":"2013","unstructured":"Fernando Magno Quintao Pereira, Raphael Ernani Rodrigues, and Victor Hugo Sperle Campos. 2013. A fast and low-overhead technique to secure programs against integer overflows Proceedings of the 2013 IEEE\/ACM International Symposium on Code Generation and Optimization (CGO '13). IEEE Computer Society, 1--11."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23404"},{"key":"e_1_3_2_2_8_1","volume-title":"Proc device registration.","year":"2017","unstructured":"redhat 2017. Proc device registration. (2017). shownotehttps:\/\/access.redhat.com\/documentation\/en-US\/Red_Hat_Enterprise_Linux\/4\/html\/Reference_Guide\/s2-proc-devices.html."},{"key":"e_1_3_2_2_9_1","volume-title":"PROTOS -- Systematic Approach to Eliminate Software Vulnerabilities. Invited presentation at Microsoft Research (May","author":"R\u00f6ning Juha","year":"2002","unstructured":"Juha R\u00f6ning, Marko Laakso, and Ari Takanen. 2002. PROTOS -- Systematic Approach to Eliminate Software Vulnerabilities. Invited presentation at Microsoft Research (May 2002)."},{"key":"e_1_3_2_2_10_1","volume-title":"Linux device drivers. \" O'Reilly Media","author":"Rubini Alessandro","unstructured":"Alessandro Rubini and Jonathan Corbet 2001. Linux device drivers. \" O'Reilly Media, Inc.\"."},{"key":"e_1_3_2_2_11_1","unstructured":"Samsung 2017. Samsung Android Kernel Sources. (2017). shownotehttp:\/\/opensource.samsung.com\/reception\/receptionSub.do?method=sub&sub=T&menu_item=mobile&classification1=mobile_phone."},{"key":"e_1_3_2_2_12_1","volume-title":"Don't trust your USB! How to find bugs in USB device drivers. Blackhat Europe","author":"Schumilo Sergej","year":"2014","unstructured":"Sergej Schumilo, Ralf Spenneberg, and H Schwartke. 2014. Don't trust your USB! How to find bugs in USB device drivers. Blackhat Europe (2014)."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"crossref","unstructured":"Kwan Yong Sim F-C Kuo and R Merkel 2011. Fuzzing the out-of-memory killer on embedded Linux: an adaptive random approach Proceedings of the 2011 ACM Symposium on Applied Computing (SAC '11). ACM 387--392.","DOI":"10.1145\/1982185.1982268"},{"key":"e_1_3_2_2_14_1","unstructured":"Sony 2017. Sony Android Kernel Sources. (2017). shownotehttps:\/\/github.com\/sonyxperiadev\/kernel."},{"key":"e_1_3_2_2_15_1","volume-title":"Driller: Augmenting Fuzzing Through Selective Symbolic Execution Proceedings of the 2016 Network and Distributed System Security Symposium (NDSS '16)","author":"Stephens Nick","year":"2016","unstructured":"Nick Stephens, John Grosen, Christopher Salls, Andrew Dutcher, Ruoyu Wang, Jacopo Corbetta, Yan Shoshitaishvili, Christopher Kruegel, and Giovanni Vigna 2016. Driller: Augmenting Fuzzing Through Selective Symbolic Execution Proceedings of the 2016 Network and Distributed System Security Symposium (NDSS '16). San Diego, CA, USA."},{"key":"e_1_3_2_2_16_1","volume-title":"Linux Security Summit","author":"Stoep Jeffrey Vander","unstructured":"Jeffrey Vander Stoep. 2016. Android: protecting the kernel. In Linux Security Summit. Linux Foundation."},{"key":"e_1_3_2_2_17_1","unstructured":"Linus Torvalds. 2011. C2XML - Converting source code to XML. (2011). shownotehttp:\/\/c2xml.sourceforge.net\/."},{"key":"e_1_3_2_2_19_1","unstructured":"Wiki 2017. Tanenbaum--Torvalds debate. (2017). shownotehttps:\/\/en.wikipedia.org\/wiki\/Tanenbaum%E2%80%93Torvalds_debate."},{"key":"e_1_3_2_2_20_1","unstructured":"Xiaomi 2017. Xiaomi Android Kernel Sources. (2017). shownotehttps:\/\/github.com\/MiCode\/Xiaomi_Kernel_OpenSource."},{"key":"e_1_3_2_2_21_1","unstructured":"Xst3nZ 2012. IOCTLbf is just a small tool (Proof of Concept) that can be used to search vulnerabilities in Windows kernel drivers. (2012). shownotehttps:\/\/code.google.com\/archive\/p\/ioctlbf\/."},{"key":"e_1_3_2_2_22_1","unstructured":"Michal Zalewski. 2014. Binary fuzzing strategies: what works what doesn't. (2014). shownotehttps:\/\/lcamtuf.blogspot.com\/2014\/08\/binary-fuzzing-strategies-what-works.html."},{"key":"e_1_3_2_2_23_1","unstructured":"M. Zalewski. 2017. American Fuzzy Lop. (2017). shownotehttp:\/\/lcamtuf.coredump.cx\/afl\/technical_details.txt. endthebibliography"}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","location":"Dallas Texas USA","acronym":"CCS '17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134069","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134069","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134069","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T19:35:07Z","timestamp":1750966507000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134069"}},"subtitle":["Interface Aware Fuzzing for Kernel Drivers"],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":22,"alternative-id":["10.1145\/3133956.3134069","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3134069","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}