{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T01:54:14Z","timestamp":1773194054468,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,7,18]]},"DOI":"10.1145\/3533767.3534226","type":"proceedings-article","created":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T14:28:50Z","timestamp":1657895330000},"page":"404-416","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["PrIntFuzz: fuzzing Linux drivers via automated virtual device simulation"],"prefix":"10.1145","author":[{"given":"Zheyu","family":"Ma","sequence":"first","affiliation":[{"name":"Tsinghua University, China \/ Beijing National Research Center for Information Science and Technology, China"}]},{"given":"Bodong","family":"Zhao","sequence":"additional","affiliation":[{"name":"Tsinghua University, China \/ Beijing National Research Center for Information Science and Technology, China"}]},{"given":"Letu","family":"Ren","sequence":"additional","affiliation":[{"name":"Tsinghua University, China \/ Beijing National Research Center for Information Science and Technology, China"}]},{"given":"Zheming","family":"Li","sequence":"additional","affiliation":[{"name":"Tsinghua University, China \/ Beijing National Research Center for Information Science and Technology, China"}]},{"given":"Siqi","family":"Ma","sequence":"additional","affiliation":[{"name":"UNSW, Australia"}]},{"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[{"name":"Hong Kong Polytechnic University, China"}]},{"given":"Chao","family":"Zhang","sequence":"additional","affiliation":[{"name":"Tsinghua University, China \/ Beijing National Research Center for Information Science and Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2022,7,18]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Top 50 Products By Total Number Of \"Distinct\" Vulnerabilities","year":"2021","unstructured":"2021. Top 50 Products By Total Number Of \"Distinct\" Vulnerabilities in 2021 . https:\/\/www.cvedetails.com\/top-50-products.php?year=2021 2021. Top 50 Products By Total Number Of \"Distinct\" Vulnerabilities in 2021. https:\/\/www.cvedetails.com\/top-50-products.php?year=2021"},{"key":"e_1_3_2_1_2_1","unstructured":"Jia-Ju Bai Julia Lawall Qiu-Liang Chen and Shi-Min Hu. 2019. Effective static analysis of concurrency use-after-free bugs in Linux device drivers. In 2019 $USENIX$ Annual Technical Conference ($USENIX$$ATC$ 19). 255\u2013268. \t\t\t\t\t  Jia-Ju Bai Julia Lawall Qiu-Liang Chen and Shi-Min Hu. 2019. Effective static analysis of concurrency use-after-free bugs in Linux device drivers. In 2019 $USENIX$ Annual Technical Conference ($USENIX$$ATC$ 19). 255\u2013268."},{"key":"e_1_3_2_1_3_1","volume-title":"30th $USENIX$ Security Symposium ($USENIX$ Security 21).","author":"Bai Jia-Ju","unstructured":"Jia-Ju Bai , Tuo Li , Kangjie Lu , and Shi-Min Hu. 2021. Static Detection of Unsafe $DMA$ Accesses in Device Drivers . In 30th $USENIX$ Security Symposium ($USENIX$ Security 21). Jia-Ju Bai, Tuo Li, Kangjie Lu, and Shi-Min Hu. 2021. Static Detection of Unsafe $DMA$ Accesses in Device Drivers. In 30th $USENIX$ Security Symposium ($USENIX$ Security 21)."},{"key":"e_1_3_2_1_4_1","unstructured":"Jia-Ju Bai Yu-Ping Wang Julia Lawall and Shi-Min Hu. 2018. $DSAC$: Effective Static Analysis of Sleep-in-Atomic-Context Bugs in Kernel Modules. In 2018 $USENIX$ Annual Technical Conference ($USENIX$$ATC$ 18). 587\u2013600. \t\t\t\t\t  Jia-Ju Bai Yu-Ping Wang Julia Lawall and Shi-Min Hu. 2018. $DSAC$: Effective Static Analysis of Sleep-in-Atomic-Context Bugs in Kernel Modules. In 2018 $USENIX$ Annual Technical Conference ($USENIX$$ATC$ 18). 587\u2013600."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00114"},{"key":"e_1_3_2_1_6_1","volume-title":"Linux device drivers. \" O\u2019Reilly Media","author":"Corbet Jonathan","unstructured":"Jonathan Corbet , Alessandro Rubini , and Greg Kroah-Hartman . 2005. Linux device drivers. \" O\u2019Reilly Media , Inc .\". Jonathan Corbet, Alessandro Rubini, and Greg Kroah-Hartman. 2005. Linux device drivers. \" O\u2019Reilly Media, Inc.\"."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134069"},{"key":"e_1_3_2_1_8_1","volume-title":"ADDFuzzer: A New Fuzzing Framework of Android Device Drivers. In 2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA). 88\u201391","author":"Cui Baojiang","year":"2015","unstructured":"Baojiang Cui , Yunze Ni , and Yilun Fu . 2015 . ADDFuzzer: A New Fuzzing Framework of Android Device Drivers. In 2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA). 88\u201391 . Baojiang Cui, Yunze Ni, and Yilun Fu. 2015. ADDFuzzer: A New Fuzzing Framework of Android Device Drivers. In 2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA). 88\u201391."},{"key":"e_1_3_2_1_9_1","unstructured":"GoodFET. 2018. Facedancer21. http:\/\/goodfet.sourceforge.net\/hardware\/facedancer21\/ \t\t\t\t\t  GoodFET. 2018. Facedancer21. http:\/\/goodfet.sourceforge.net\/hardware\/facedancer21\/"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134103"},{"key":"e_1_3_2_1_11_1","volume-title":"VIA: Analyzing Device Interfaces of Protected Virtual Machines. arXiv preprint arXiv:2109.10660.","author":"Hetzelt Felicitas","year":"2021","unstructured":"Felicitas Hetzelt , Martin Radev , Robert Buhren , Mathias Morbitzer , and Jean-Pierre Seifert . 2021 . VIA: Analyzing Device Interfaces of Protected Virtual Machines. arXiv preprint arXiv:2109.10660. Felicitas Hetzelt, Martin Radev, Robert Buhren, Mathias Morbitzer, and Jean-Pierre Seifert. 2021. VIA: Analyzing Device Interfaces of Protected Virtual Machines. arXiv preprint arXiv:2109.10660."},{"key":"e_1_3_2_1_12_1","unstructured":"Google Inc.. [n.d.]. syzkaller - kernel fuzzer.. https:\/\/github.com\/google\/syzkaller \t\t\t\t\t  Google Inc.. [n.d.]. syzkaller - kernel fuzzer.. https:\/\/github.com\/google\/syzkaller"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2019.00022"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2248487.2150987"},{"key":"e_1_3_2_1_15_1","unstructured":"Sylvester Keil and Clemens Kolbitsch. 2007. Stateful fuzzing of wireless device drivers in an emulated environment. Black Hat Japan. \t\t\t\t\t  Sylvester Keil and Clemens Kolbitsch. 2007. Stateful fuzzing of wireless device drivers in an emulated environment. Black Hat Japan."},{"key":"e_1_3_2_1_16_1","unstructured":"Linux kernel document.. [n.d.]. The Kernel Address Sanitizer (KASAN). https:\/\/www.kernel.org\/doc\/html\/v4.13\/dev-tools\/kasan.html \t\t\t\t\t  Linux kernel document.. [n.d.]. The Kernel Address Sanitizer (KASAN). https:\/\/www.kernel.org\/doc\/html\/v4.13\/dev-tools\/kasan.html"},{"key":"e_1_3_2_1_17_1","unstructured":"David Kierznowski. [n.d.]. BadUSB 2.0: Exploring USB Man-In-The-Middle Attacks. \t\t\t\t\t  David Kierznowski. [n.d.]. BadUSB 2.0: Exploring USB Man-In-The-Middle Attacks."},{"key":"e_1_3_2_1_18_1","volume-title":"Yeongjin Jang, Insik Shin, and Byoungyoung Lee.","author":"Kim Kyungtae","year":"2020","unstructured":"Kyungtae Kim , Dae R Jeong , Chung Hwan Kim , Yeongjin Jang, Insik Shin, and Byoungyoung Lee. 2020 . HFL : Hybrid Fuzzing on the Linux Kernel.. In NDSS. Kyungtae Kim, Dae R Jeong, Chung Hwan Kim, Yeongjin Jang, Insik Shin, and Byoungyoung Lee. 2020. HFL: Hybrid Fuzzing on the Linux Kernel.. In NDSS."},{"key":"e_1_3_2_1_19_1","unstructured":"Linux. 2020. Patch. https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/netdev\/net-next.git\/commit\/drivers\/net\/vmxnet3?id=de1da8bcf40564a2adada2d5d5426e05355f66e8 \t\t\t\t\t  Linux. 2020. Patch. https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/netdev\/net-next.git\/commit\/drivers\/net\/vmxnet3?id=de1da8bcf40564a2adada2d5d5426e05355f66e8"},{"key":"e_1_3_2_1_20_1","unstructured":"Linux. 2020. Patch. https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/torvalds\/linux.git\/commit\/?id=3e1c6846b9e108740ef8a37be80314053f5dd52a \t\t\t\t\t  Linux. 2020. Patch. https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/torvalds\/linux.git\/commit\/?id=3e1c6846b9e108740ef8a37be80314053f5dd52a"},{"key":"e_1_3_2_1_21_1","volume-title":"28th $USENIX$ Security Symposium ($USENIX$ Security 19). 1769\u20131786.","author":"Lu Kangjie","unstructured":"Kangjie Lu , Aditya Pakki , and Qiushi Wu. 2019. Detecting missing-check bugs via semantic-and context-aware criticalness and constraints inferences . In 28th $USENIX$ Security Symposium ($USENIX$ Security 19). 1769\u20131786. Kangjie Lu, Aditya Pakki, and Qiushi Wu. 2019. Detecting missing-check bugs via semantic-and context-aware criticalness and constraints inferences. In 28th $USENIX$ Security Symposium ($USENIX$ Security 19). 1769\u20131786."},{"key":"e_1_3_2_1_22_1","volume-title":"26th $USENIX$ Security Symposium ($USENIX$ Security 17). 1007\u20131024.","author":"Machiry Aravind","unstructured":"Aravind Machiry , Chad Spensky , Jake Corina , Nick Stephens , Christopher Kruegel , and Giovanni Vigna . 2017. $DR$.$CHECKER$ : A soundy analysis for linux kernel drivers . In 26th $USENIX$ Security Symposium ($USENIX$ Security 17). 1007\u20131024. Aravind Machiry, Chad Spensky, Jake Corina, Nick Stephens, Christopher Kruegel, and Giovanni Vigna. 2017. $DR$.$CHECKER$: A soundy analysis for linux kernel drivers. In 26th $USENIX$ Security Symposium ($USENIX$ Security 17). 1007\u20131024."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3471621.3471863"},{"key":"e_1_3_2_1_24_1","volume-title":"Thunderclap: Exploring vulnerabilities in operating system IOMMU protection via DMA from untrustworthy peripherals.","author":"Markettos Theo","year":"2019","unstructured":"Theo Markettos , Colin Rothwell , Brett F Gutstein , Allison Pearce , Peter G Neumann , Simon Moore , and Robert Watson . 2019 . Thunderclap: Exploring vulnerabilities in operating system IOMMU protection via DMA from untrustworthy peripherals. Theo Markettos, Colin Rothwell, Brett F Gutstein, Allison Pearce, Peter G Neumann, Simon Moore, and Robert Watson. 2019. Thunderclap: Exploring vulnerabilities in operating system IOMMU protection via DMA from untrustworthy peripherals."},{"key":"e_1_3_2_1_25_1","unstructured":"\"Grant Grundler\" \"Martin Mares\". [n.d.]. 1. How To Write Linux PCI Drivers (v5.16-rc1 ed.). \t\t\t\t\t  \"Grant Grundler\" \"Martin Mares\". [n.d.]. 1. How To Write Linux PCI Drivers (v5.16-rc1 ed.)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2021NGP0005"},{"key":"e_1_3_2_1_27_1","volume-title":"Moonshine: Optimizing $OS$ fuzzer seed selection with trace distillation. In 27th $USENIX$ Security Symposium ($USENIX$ Security 18). 729\u2013743.","author":"Pailoor Shankara","year":"2018","unstructured":"Shankara Pailoor , Andrew Aday , and Suman Jana . 2018 . Moonshine: Optimizing $OS$ fuzzer seed selection with trace distillation. In 27th $USENIX$ Security Symposium ($USENIX$ Security 18). 729\u2013743. Shankara Pailoor, Andrew Aday, and Suman Jana. 2018. Moonshine: Optimizing $OS$ fuzzer seed selection with trace distillation. In 27th $USENIX$ Security Symposium ($USENIX$ Security 18). 729\u2013743."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417256"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484811"},{"key":"e_1_3_2_1_30_1","volume-title":"Digtool: A virtualization-based framework for detecting kernel vulnerabilities. In 26th $USENIX$ Security Symposium ($USENIX$ Security 17). 149\u2013165.","author":"Pan Jianfeng","year":"2017","unstructured":"Jianfeng Pan , Guanglu Yan , and Xiaocao Fan . 2017 . Digtool: A virtualization-based framework for detecting kernel vulnerabilities. In 26th $USENIX$ Security Symposium ($USENIX$ Security 17). 149\u2013165. Jianfeng Pan, Guanglu Yan, and Xiaocao Fan. 2017. Digtool: A virtualization-based framework for detecting kernel vulnerabilities. In 26th $USENIX$ Security Symposium ($USENIX$ Security 17). 149\u2013165."},{"key":"e_1_3_2_1_31_1","volume-title":"11th $USENIX$ Workshop on Offensive Technologies ($WOOT$ 17).","author":"Patrick-Evans James","unstructured":"James Patrick-Evans , Lorenzo Cavallaro , and Johannes Kinder . 2017. $POTUS$ : Probing Off-The-Shelf $USB$ Drivers with Symbolic Fault Injection . In 11th $USENIX$ Workshop on Offensive Technologies ($WOOT$ 17). James Patrick-Evans, Lorenzo Cavallaro, and Johannes Kinder. 2017. $POTUS$: Probing Off-The-Shelf $USB$ Drivers with Symbolic Fault Injection. In 11th $USENIX$ Workshop on Offensive Technologies ($WOOT$ 17)."},{"key":"e_1_3_2_1_32_1","volume-title":"29th $USENIX$ Security Symposium ($USENIX$ Security 20). 2559\u20132575.","author":"Peng Hui","unstructured":"Hui Peng and Mathias Payer . 2020. USBFuzz: A Framework for Fuzzing $USB$ Drivers by Device Emulation . In 29th $USENIX$ Security Symposium ($USENIX$ Security 20). 2559\u20132575. Hui Peng and Mathias Payer. 2020. USBFuzz: A Framework for Fuzzing $USB$ Drivers by Device Emulation. In 29th $USENIX$ Security Symposium ($USENIX$ Security 20). 2559\u20132575."},{"key":"e_1_3_2_1_33_1","volume-title":"9th RoEduNet IEEE International Conference. 328\u2013333","author":"Purdila Octavian","year":"2010","unstructured":"Octavian Purdila , Lucian Adrian Grijincu , and Nicolae Tapus . 2010 . LKL: The Linux kernel library . In 9th RoEduNet IEEE International Conference. 328\u2013333 . Octavian Purdila, Lucian Adrian Grijincu, and Nicolae Tapus. 2010. LKL: The Linux kernel library. In 9th RoEduNet IEEE International Conference. 328\u2013333."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00094"},{"key":"e_1_3_2_1_35_1","volume-title":"Symdrive: Testing drivers without devices. In 10th $USENIX$ Symposium on Operating Systems Design and Implementation ($OSDI$ 12). 279\u2013292.","author":"Renzelmann Matthew J","year":"2012","unstructured":"Matthew J Renzelmann , Asim Kadav , and Michael M Swift . 2012 . Symdrive: Testing drivers without devices. In 10th $USENIX$ Symposium on Operating Systems Design and Implementation ($OSDI$ 12). 279\u2013292. Matthew J Renzelmann, Asim Kadav, and Michael M Swift. 2012. Symdrive: Testing drivers without devices. In 10th $USENIX$ Symposium on Operating Systems Design and Implementation ($OSDI$ 12). 279\u2013292."},{"key":"e_1_3_2_1_36_1","volume-title":"26th $USENIX$ Security Symposium ($USENIX$ Security 17). 167\u2013182.","author":"Schumilo Sergej","unstructured":"Sergej Schumilo , Cornelius Aschermann , Robert Gawlik , Sebastian Schinzel , and Thorsten Holz . 2017. kafl: Hardware-assisted feedback fuzzing for $OS$ kernels . In 26th $USENIX$ Security Symposium ($USENIX$ Security 17). 167\u2013182. Sergej Schumilo, Cornelius Aschermann, Robert Gawlik, Sebastian Schinzel, and Thorsten Holz. 2017. kafl: Hardware-assisted feedback fuzzing for $OS$ kernels. In 26th $USENIX$ Security Symposium ($USENIX$ Security 17). 167\u2013182."},{"key":"e_1_3_2_1_37_1","first-page":"1","article-title":"Understanding Linux kernel vulnerabilities","author":"Shameli-Sendi Alireza","year":"2021","unstructured":"Alireza Shameli-Sendi . 2021 . Understanding Linux kernel vulnerabilities . Journal of Computer Virology and Hacking Techniques , 1 \u2013 14 . Alireza Shameli-Sendi. 2021. Understanding Linux kernel vulnerabilities. Journal of Computer Virology and Hacking Techniques, 1\u201314.","journal-title":"Journal of Computer Virology and Hacking Techniques"},{"key":"e_1_3_2_1_38_1","volume-title":"Periscope: An effective probing and fuzzing framework for the hardware-os boundary. In NDSS.","author":"Song Dokyung","year":"2019","unstructured":"Dokyung Song , Felicitas Hetzelt , Dipanjan Das , Chad Spensky , Yeoul Na , Stijn Volckaert , Giovanni Vigna , Christopher Kruegel , Jean-Pierre Seifert , and Michael Franz . 2019 . Periscope: An effective probing and fuzzing framework for the hardware-os boundary. In NDSS. Dokyung Song, Felicitas Hetzelt, Dipanjan Das, Chad Spensky, Yeoul Na, Stijn Volckaert, Giovanni Vigna, Christopher Kruegel, Jean-Pierre Seifert, and Michael Franz. 2019. Periscope: An effective probing and fuzzing framework for the hardware-os boundary. In NDSS."},{"key":"e_1_3_2_1_39_1","volume-title":"Jean-Pierre Seifert, and Michael Franz.","author":"Song Dokyung","year":"2020","unstructured":"Dokyung Song , Felicitas Hetzelt , Jonghwan Kim , Brent Byunghoon Kang , Jean-Pierre Seifert, and Michael Franz. 2020 . Agamotto : Accelerating kernel driver fuzzing with lightweight virtual machine checkpoints. In 29th $USENIX$ Security Symposium ($USENIX$ Security 20). 2541\u20132557. Dokyung Song, Felicitas Hetzelt, Jonghwan Kim, Brent Byunghoon Kang, Jean-Pierre Seifert, and Michael Franz. 2020. Agamotto: Accelerating kernel driver fuzzing with lightweight virtual machine checkpoints. In 29th $USENIX$ Security Symposium ($USENIX$ Security 20). 2541\u20132557."},{"key":"e_1_3_2_1_40_1","unstructured":"Jeff Vander Stoep. 2016. Android: protecting the kernel. https:\/\/events.static.linuxfound.org\/sites\/events\/files\/slides\/Android- protecting the kernel.pdf \t\t\t\t\t  Jeff Vander Stoep. 2016. Android: protecting the kernel. https:\/\/events.static.linuxfound.org\/sites\/events\/files\/slides\/Android- protecting the kernel.pdf"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3477132.3483547"},{"key":"e_1_3_2_1_42_1","volume-title":"Ardalan Amiri Sani, and Zhiyun Qian","author":"Seyed Talebi Seyed Mohammadjavad","year":"2018","unstructured":"Seyed Mohammadjavad Seyed Talebi , Hamid Tavakoli , Hang Zhang , Zheng Zhang , Ardalan Amiri Sani, and Zhiyun Qian . 2018 . Charm : Facilitating dynamic analysis of device drivers of mobile systems. In 27th $USENIX$ Security Symposium ($USENIX$ Security 18). 291\u2013307. Seyed Mohammadjavad Seyed Talebi, Hamid Tavakoli, Hang Zhang, Zheng Zhang, Ardalan Amiri Sani, and Zhiyun Qian. 2018. Charm: Facilitating dynamic analysis of device drivers of mobile systems. In 27th $USENIX$ Security Symposium ($USENIX$ Security 18). 291\u2013307."},{"key":"e_1_3_2_1_43_1","volume-title":"30th $USENIX$ Security Symposium ($USENIX$ Security 21).","author":"Tan Xin","unstructured":"Xin Tan , Yuan Zhang , Xiyu Yang , Kangjie Lu , and Min Yang . 2021. Detecting Kernel Refcount Bugs with Two-Dimensional Consistency Checking . In 30th $USENIX$ Security Symposium ($USENIX$ Security 21). Xin Tan, Yuan Zhang, Xiyu Yang, Kangjie Lu, and Min Yang. 2021. Detecting Kernel Refcount Bugs with Two-Dimensional Consistency Checking. In 30th $USENIX$ Security Symposium ($USENIX$ Security 21)."},{"key":"e_1_3_2_1_44_1","unstructured":"ulfalizer. 2019. Kconfiglib. https:\/\/github.com\/ulfalizer\/Kconfiglib\/ \t\t\t\t\t  ulfalizer. 2019. Kconfiglib. https:\/\/github.com\/ulfalizer\/Kconfiglib\/"},{"key":"e_1_3_2_1_45_1","unstructured":"Dmitry Vyukov. 2018. kernel: add kcov code coverage. https:\/\/lwn.net\/Articles\/671640\/ \t\t\t\t\t  Dmitry Vyukov. 2018. kernel: add kcov code coverage. https:\/\/lwn.net\/Articles\/671640\/"},{"key":"e_1_3_2_1_46_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Wang Daimeng","year":"2021","unstructured":"Daimeng Wang , Zheng Zhang , Hang Zhang , Zhiyun Qian , Srikanth V Krishnamurthy , and Nael Abu-Ghazaleh . 2021 . $SyzVegas$: Beating Kernel Fuzzing Odds with Reinforcement Learning . In 30th USENIX Security Symposium (USENIX Security 21) . 2741\u20132758. Daimeng Wang, Zheng Zhang, Hang Zhang, Zhiyun Qian, Srikanth V Krishnamurthy, and Nael Abu-Ghazaleh. 2021. $SyzVegas$: Beating Kernel Fuzzing Odds with Reinforcement Learning. In 30th USENIX Security Symposium (USENIX Security 21). 2741\u20132758."},{"key":"e_1_3_2_1_47_1","unstructured":"Matthew Wilcox and Alan Cox. [n.d.]. Bus-Independent Device Accesses. https:\/\/www.kernel.org\/doc\/html\/latest\/driver-api\/device-io.html \t\t\t\t\t  Matthew Wilcox and Alan Cox. [n.d.]. Bus-Independent Device Accesses. https:\/\/www.kernel.org\/doc\/html\/latest\/driver-api\/device-io.html"},{"key":"e_1_3_2_1_48_1","volume-title":"30th $USENIX$ Security Symposium ($USENIX$ Security 21).","author":"Wu Qiushi","unstructured":"Qiushi Wu , Aditya Pakki , Navid Emamdoost , Stephen McCamant , and Kangjie Lu. 2021. Understanding and Detecting Disordered Error Handling with Precise Function Pairing . In 30th $USENIX$ Security Symposium ($USENIX$ Security 21). Qiushi Wu, Aditya Pakki, Navid Emamdoost, Stephen McCamant, and Kangjie Lu. 2021. Understanding and Detecting Disordered Error Handling with Precise Function Pairing. In 30th $USENIX$ Security Symposium ($USENIX$ Security 21)."}],"event":{"name":"ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis","location":"Virtual South Korea","acronym":"ISSTA '22","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3533767.3534226","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3533767.3534226","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T18:43:40Z","timestamp":1750272220000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3533767.3534226"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,18]]},"references-count":48,"alternative-id":["10.1145\/3533767.3534226","10.1145\/3533767"],"URL":"https:\/\/doi.org\/10.1145\/3533767.3534226","relation":{},"subject":[],"published":{"date-parts":[[2022,7,18]]},"assertion":[{"value":"2022-07-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}