{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T00:49:19Z","timestamp":1775868559743,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,6,27]],"date-time":"2020-06-27T00:00:00Z","timestamp":1593216000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"University of Virginia, SEAS","award":["SS00409-31330"],"award-info":[{"award-number":["SS00409-31330"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,27]]},"DOI":"10.1145\/3377811.3380413","type":"proceedings-article","created":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T18:25:34Z","timestamp":1601576734000},"page":"246-257","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":51,"title":["Is rust used safely by software developers?"],"prefix":"10.1145","author":[{"given":"Ana Nora","family":"Evans","sequence":"first","affiliation":[{"name":"University of Virginia"}]},{"given":"Bradford","family":"Campbell","sequence":"additional","affiliation":[{"name":"University of Virginia"}]},{"given":"Mary Lou","family":"Soffa","sequence":"additional","affiliation":[{"name":"University of Virginia"}]}],"member":"320","published-online":{"date-parts":[[2020,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2020. Rust Subreddit. https:\/\/www.reddit.com\/r\/rust\/. (2020)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00111"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889229"},{"key":"e_1_3_2_1_4_1","volume-title":"Program Logics for Certified Compilers","author":"Appel Andrew W.","unstructured":"Andrew W. Appel, Robert Dockins, Aquinas Hobor, Lennart Beringer, Josiah Dodds, Gordon Stewart, Sandrine Blazy, and Xavier Leroy. 2014. Program Logics for Certified Compilers. Cambridge University Press, New York, NY, USA."},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the 11th ACM SIGPLAN Conference on Object-oriented Programming Systems, Languages, and Applications (OOPSLA '96)","author":"David","unstructured":"David F. Bacon and Peter F. Sweeney. 1996. Fast Static Analysis of C++ Virtual Function Calls. In Proceedings of the 11th ACM SIGPLAN Conference on Object-oriented Programming Systems, Languages, and Applications (OOPSLA '96). ACM, New York, NY, USA, 324--341."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3102980.3103006"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597082"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3144555.3144560"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818846"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196398.3196428"},{"key":"e_1_3_2_1_11_1","volume-title":"Optimization of Object-Oriented Programs Using Static Class Hierarchy Analysis. In ECOOP'95 - Object-Oriented Programming, 9th European Conference, \u00c5arhus, Denmark, August 7--11","author":"Dean Jeffrey","year":"1995","unstructured":"Jeffrey Dean, David Grove, and Craig Chambers. 1995. Optimization of Object-Oriented Programs Using Static Class Hierarchy Analysis. In ECOOP'95 - Object-Oriented Programming, 9th European Conference, \u00c5arhus, Denmark, August 7--11, 1995, Mario Tokoro and Remo Pareschi (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 77--101."},{"key":"e_1_3_2_1_12_1","volume-title":"C","author":"Dougherty C. R.","year":"2008","unstructured":"C. R. Dougherty and R. C. Seacord. C. 2008. C compilers may silently discard some wraparound checks. https:\/\/www.kb.cert.org\/vuls\/id\/162289\/. (2008)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00050"},{"key":"e_1_3_2_1_14_1","unstructured":"Patrick Gaydon. 2010. Project Servo Technology from the past come to save the future from itself. http:\/\/venge.net\/graydon\/talks\/intro-talk-2.pdf. (2010)."},{"key":"e_1_3_2_1_15_1","volume-title":"K-Miner: Uncovering Memory Corruption in Linux. In 25th Annual Network and Distributed System Security Symposium, NDSS 2018","author":"Gens David","year":"2018","unstructured":"David Gens, Simon Schmitt, Lucas Davi, and Ahmad-Reza Sadeghi. 2018. K-Miner: Uncovering Memory Corruption in Linux. In 25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, February 18--21, 2018."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00095"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3371109"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3158154"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0956796818000151"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132786"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2926697.2926707"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2814270.2814313"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2980983.2908081"},{"key":"e_1_3_2_1_24_1","volume-title":"NetBricks: Taking the V out of NFV In Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation (OSDI'16)","author":"Panda Aurojit","unstructured":"Aurojit Panda, Sangjin Han, Keon Jang, Melvin Walls, Sylvia Ratnasamy, and Scott Shenker. 2016. NetBricks: Taking the V out of NFV In Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation (OSDI'16). USENIX Association, Berkeley, CA, USA, 203--216."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2983990.2983991"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2012.24"},{"key":"e_1_3_2_1_27_1","volume-title":"2008 ACM\/IEEE 30th International Conference on Software Engineering. 541--550","author":"Rigby P.","unstructured":"P. Rigby, D. German, and M. Storey. 2008. Open source software peer review practices. In 2008 ACM\/IEEE 30th International Conference on Software Engineering. 541--550."},{"key":"e_1_3_2_1_28_1","first-page":"3","article-title":"Constructing the Call Graph of a Program","volume":"5","author":"Ryder B. G.","year":"1979","unstructured":"B. G. Ryder. 1979. Constructing the Call Graph of a Program. IEEE Trans. Softw. Eng. 5, 3 (May 1979), 216--226.","journal-title":"IEEE Trans. Softw. Eng."},{"key":"e_1_3_2_1_29_1","volume-title":"SoK: Sanitizing for Security. CoRR abs\/1806.04355","author":"Song Dokyung","year":"2018","unstructured":"Dokyung Song, Julian Lettner, Prabhu Rajasekaran, Yeoul Na, Stijn Volckaert, Per Larsen, and Michael Franz. 2018. SoK: Sanitizing for Security. CoRR abs\/1806.04355 (2018). arXiv:1806.04355 http:\/\/arxiv.org\/abs\/1806.04355"},{"key":"e_1_3_2_1_30_1","volume-title":"SoK: Eternal War in Memory. In 2013 IEEE Symposium on Security and Privacy. 48--62","author":"Szekeres L.","unstructured":"L. Szekeres, M. Payer, T. Wei, and D. Song. 2013. SoK: Eternal War in Memory. In 2013 IEEE Symposium on Security and Privacy. 48--62."},{"key":"e_1_3_2_1_31_1","unstructured":"The Actix Team. 2018. Actix. https:\/\/github.com\/actix\/actix. (2018)."},{"key":"e_1_3_2_1_32_1","unstructured":"The Mozilla Research Team. 2020. Mozilla Research. https:\/\/research.mozilla.org\/. (2020)."},{"key":"e_1_3_2_1_33_1","unstructured":"The Redox Team. 2018. Redox. https:\/\/www.redox-os.org\/. (2018)."},{"key":"e_1_3_2_1_34_1","unstructured":"The Rust Team. 2018. The Rust Language Reference. https:\/\/doc.rust-lang.org\/reference\/index.html. (2018)."},{"key":"e_1_3_2_1_35_1","unstructured":"The Rust Team. 2018. Unsafe Code Guidelines Reference. https:\/\/rust-lang.github.io\/unsafe-code-guidelines\/.(2018)."},{"key":"e_1_3_2_1_36_1","unstructured":"The Rust Team. 2019. Unsafe Code Guidelines. https:\/\/github.com\/rust-lang\/unsafe-code-guidelines. (2019)."},{"key":"e_1_3_2_1_37_1","unstructured":"tx4414. 2018. Unsafe Rust in actix-web other libraries. https:\/\/www.reddit.com\/r\/rust\/comments\/8s7gei\/unsafe_rust_in_actixweb_other_libraries\/. (2018)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522728"},{"key":"e_1_3_2_1_39_1","volume-title":"Oxide: The Essence of Rust. CoRR abs\/1903.00982","author":"Weiss Aaron","year":"2019","unstructured":"Aaron Weiss, Daniel Patterson, Nicholas D. Matsakis, and Amal Ahmed. 2019. Oxide: The Essence of Rust. CoRR abs\/1903.00982 (2019). arXiv:1903.00982 http:\/\/arxiv.org\/abs\/1903.00982"}],"event":{"name":"ICSE '20: 42nd International Conference on Software Engineering","location":"Seoul South Korea","acronym":"ICSE '20","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","KIISE Korean Institute of Information Scientists and Engineers","IEEE CS"]},"container-title":["Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377811.3380413","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3377811.3380413","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:40Z","timestamp":1750200100000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377811.3380413"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,27]]},"references-count":39,"alternative-id":["10.1145\/3377811.3380413","10.1145\/3377811"],"URL":"https:\/\/doi.org\/10.1145\/3377811.3380413","relation":{},"subject":[],"published":{"date-parts":[[2020,6,27]]},"assertion":[{"value":"2020-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}