{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:12:26Z","timestamp":1750219946939,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation","award":["1931208","2045478","1815621"],"award-info":[{"award-number":["1931208","2045478","1815621"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3548606.3560661","type":"proceedings-article","created":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T11:41:28Z","timestamp":1667821288000},"page":"3253-3267","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs"],"prefix":"10.1145","author":[{"given":"Qingyang","family":"Zhou","sequence":"first","affiliation":[{"name":"University of Minnesota, Minneapolis, MN, USA"}]},{"given":"Qiushi","family":"Wu","sequence":"additional","affiliation":[{"name":"University of Minnesota, Minneapolis, MN, USA"}]},{"given":"Dinghao","family":"Liu","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"given":"Shouling","family":"Ji","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"given":"Kangjie","family":"Lu","sequence":"additional","affiliation":[{"name":"University of Minnesota, Minneapolis, MN, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,11,7]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Ahmadi Mansour","year":"2021","unstructured":"Mansour Ahmadi , Reza Mirzazade farkhani, Ryan Williams , and Long Lu . 2021 . Finding Bugs Using Your Own Code: Detecting Functionally-similar yet Inconsistent Code . In 30th USENIX Security Symposium (USENIX Security 21) . USENIX Association , 2025--2040. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/ahmadi Mansour Ahmadi, Reza Mirzazade farkhani, Ryan Williams, and Long Lu. 2021. Finding Bugs Using Your Own Code: Detecting Functionally-similar yet Inconsistent Code. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 2025--2040. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/ahmadi"},{"key":"e_1_3_2_2_2_1","unstructured":"Jia-Ju Bai Julia Lawall Qiu-Liang Chen and Shi-Min Hu. 2019. Effective static analysis of concurrency use-after-free bugs in Linux device drivers. In 2019 $$USENIX$$ Annual Technical Conference ($$USENIX$$$$ATC$$ 19). 255--268.  Jia-Ju Bai Julia Lawall Qiu-Liang Chen and Shi-Min Hu. 2019. Effective static analysis of concurrency use-after-free bugs in Linux device drivers. In 2019 $$USENIX$$ Annual Technical Conference ($$USENIX$$$$ATC$$ 19). 255--268."},{"key":"e_1_3_2_2_3_1","volume-title":"Static Detection of Unsafe DMA Accesses in Device Drivers. In 30th USENIX Security Symposium (USENIX Security 21)","author":"Bai Jia-Ju","year":"2021","unstructured":"Jia-Ju Bai , Tuo Li , Kangjie Lu , and Shi-Min Hu . 2021 . Static Detection of Unsafe DMA Accesses in Device Drivers. In 30th USENIX Security Symposium (USENIX Security 21) . USENIX Association, 1629--1645. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/bai Jia-Ju Bai, Tuo Li, Kangjie Lu, and Shi-Min Hu. 2021. Static Detection of Unsafe DMA Accesses in Device Drivers. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 1629--1645. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/bai"},{"key":"e_1_3_2_2_4_1","unstructured":"Dan Carpenter. 2009. Smatch - the source matcher. http:\/\/smatch.sourceforge.  Dan Carpenter. 2009. Smatch - the source matcher. http:\/\/smatch.sourceforge."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24416"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945468"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/502059.502041"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00025"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-014-0203-1"},{"key":"e_1_3_2_2_10_1","volume-title":"USENIX Security Symposium. 345--362","author":"Jana Suman","year":"2016","unstructured":"Suman Jana , Yuan Jochen Kang , Samuel Roth , and Baishakhi Ray . 2016 . Automatically Detecting Error Handling Bugs Using Error Specifications .. In USENIX Security Symposium. 345--362 . Suman Jana, Yuan Jochen Kang, Samuel Roth, and Baishakhi Ray. 2016. Automatically Detecting Error Handling Bugs Using Error Specifications.. In USENIX Security Symposium. 345--362."},{"volume-title":"BugGraph: Differentiating Source-Binary Code Similarity with Graph Triplet-Loss Network","author":"Ji Yuede","key":"e_1_3_2_2_11_1","unstructured":"Yuede Ji , Lei Cui , and H. Howie Huang . 2021. BugGraph: Differentiating Source-Binary Code Similarity with Graph Triplet-Loss Network . Association for Computing Machinery , New York, NY, USA , 702--715. Yuede Ji, Lei Cui, and H. Howie Huang. 2021. BugGraph: Differentiating Source-Binary Code Similarity with Graph Triplet-Loss Network. Association for Computing Machinery, New York, NY, USA, 702--715."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970354"},{"key":"e_1_3_2_2_13_1","volume-title":"Engler","author":"Kremenek Theodore","year":"2003","unstructured":"Theodore Kremenek and Dawson R . Engler . 2003 . Z-Ranking: Using Statistical Analysis to Counter the Impact of Static Analysis Approximations. In SAS. Theodore Kremenek and Dawson R. Engler. 2003. Z-Ranking: Using Statistical Analysis to Counter the Impact of Static Analysis Approximations. In SAS."},{"key":"e_1_3_2_2_14_1","volume-title":"7th USENIX Symposium on Operating Systems Design and Implementation (OSDI 06)","author":"Kremenek Ted","year":"2006","unstructured":"Ted Kremenek , Paul Twohey , Godmar Back , and Andrew Ng . 2006 . From Uncertainty to Belief: Inferring the Specification Within . In 7th USENIX Symposium on Operating Systems Design and Implementation (OSDI 06) . USENIX Association, Seattle, WA. https:\/\/www.usenix.org\/conference\/osdi-06\/uncertainty-belief-inferring-specification-within Ted Kremenek, Paul Twohey, Godmar Back, and Andrew Ng. 2006. From Uncertainty to Belief: Inferring the Specification Within. In 7th USENIX Symposium on Operating Systems Design and Implementation (OSDI 06). USENIX Association, Seattle, WA. https:\/\/www.usenix.org\/conference\/osdi-06\/uncertainty-belief-inferring-specification-within"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991102"},{"volume-title":"aDiff: Cross-Version Binary Code Similarity Detection with DNN","author":"Liu Bingchang","key":"e_1_3_2_2_16_1","unstructured":"Bingchang Liu , Wei Huo , Chao Zhang , Wenchao Li , Feng Li , Aihua Piao , and Wei Zou . 2018. aDiff: Cross-Version Binary Code Similarity Detection with DNN . Association for Computing Machinery , New York, NY, USA , 667--678. https:\/\/doi.org\/10.1145\/3238147.3238199 10.1145\/3238147.3238199 Bingchang Liu, Wei Huo, Chao Zhang, Wenchao Li, Feng Li, Aihua Piao, and Wei Zou. 2018. aDiff: Cross-Version Binary Code Similarity Detection with DNN. Association for Computing Machinery, New York, NY, USA, 667--678. https:\/\/doi.org\/10.1145\/3238147.3238199"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485373"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134066"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3360574"},{"key":"e_1_3_2_2_20_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Lu Kangjie","year":"2019","unstructured":"Kangjie Lu , Aditya Pakki , and Qiushi Wu . 2019 . Detecting Missing-Check Bugs via Semantic- and Context-Aware Criticalness and Constraints Inferences . In 28th USENIX Security Symposium (USENIX Security 19) . USENIX Association, 1769--1786. Kangjie Lu, Aditya Pakki, and Qiushi Wu. 2019. Detecting Missing-Check Bugs via Semantic- and Context-Aware Criticalness and Constraints Inferences. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, 1769--1786."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872362.2872389"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815422"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594295"},{"key":"e_1_3_2_2_25_1","volume-title":"Ren\u00e9 Rydhof Hansen, and Gilles Muller","author":"Padioleau Yoann","year":"2008","unstructured":"Yoann Padioleau , Julia Lawall , Ren\u00e9 Rydhof Hansen, and Gilles Muller . 2008 . Documenting and automating collateral evolutions in Linux device drivers. Acm sigops operating systems review , Vol. 42 , 4 (2008), 247--260. Yoann Padioleau, Julia Lawall, Ren\u00e9 Rydhof Hansen, and Gilles Muller. 2008. Documenting and automating collateral evolutions in Linux device drivers. Acm sigops operating systems review , Vol. 42, 4 (2008), 247--260."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417256"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"crossref","unstructured":"Zhou Qingyang Wu Qiushi Liu Dinghao Ji Shouling and Lu Kangjie. 2022. Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs. https:\/\/github.com\/umnsec\/ndi\/blob\/main\/Nondistinguishable_Inconsistencies_as_a_Deterministic_Oracle_for_Detecting_Security_Bugs.pdf  Zhou Qingyang Wu Qiushi Liu Dinghao Ji Shouling and Lu Kangjie. 2022. Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs. https:\/\/github.com\/umnsec\/ndi\/blob\/main\/Nondistinguishable_Inconsistencies_as_a_Deterministic_Oracle_for_Detecting_Security_Bugs.pdf","DOI":"10.1145\/3548606.3560661"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3275219.3275225"},{"key":"e_1_3_2_2_29_1","volume-title":"Proceedings of the ACM on Programming Languages","volume":"3","author":"Johannes","year":"2019","unstructured":"Johannes Sp\"ath, Karim Ali , and Eric Bodden . 2019 . Context-, flow-, and field-sensitive data-flow analysis using synchronized pushdown systems . Proceedings of the ACM on Programming Languages , Vol. 3 , POPL (2019), 1--29. Johannes Sp\"ath, Karim Ali, and Eric Bodden. 2019. Context-, flow-, and field-sensitive data-flow analysis using synchronized pushdown systems. Proceedings of the ACM on Programming Languages, Vol. 3, POPL (2019), 1--29."},{"key":"e_1_3_2_2_30_1","volume-title":"USENIX Security Symposium. 379--394","author":"Tan Lin","year":"2008","unstructured":"Lin Tan , Xiaolan Zhang , Xiao Ma , Weiwei Xiong , and Yuanyuan Zhou . 2008 . AutoISES: Automatically Inferring Security Specification and Detecting Violations .. In USENIX Security Symposium. 379--394 . Lin Tan, Xiaolan Zhang, Xiao Ma, Weiwei Xiong, and Yuanyuan Zhou. 2008. AutoISES: Automatically Inferring Security Specification and Detecting Violations.. In USENIX Security Symposium. 379--394."},{"key":"e_1_3_2_2_31_1","volume-title":"Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM. In USENIX Security Symposium. 941--955","author":"Tice Caroline","year":"2014","unstructured":"Caroline Tice , Tom Roeder , Peter Collingbourne , Stephen Checkoway , \u00dalfar Erlingsson , Luis Lozano , and Geoff Pike . 2014 . Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM. In USENIX Security Symposium. 941--955 . Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, \u00dalfar Erlingsson, Luis Lozano, and Geoff Pike. 2014. Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM. In USENIX Security Symposium. 941--955."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134026"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/3155562.3155606"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243844"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31980-1_30"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24419"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100058"},{"key":"e_1_3_2_2_38_1","volume-title":"Understanding and Detecting Disordered Error Handling with Precise Function Pairing. In 30th USENIX Security Symposium (USENIX Security 21)","author":"Wu Qiushi","year":"2021","unstructured":"Qiushi Wu , Aditya Pakki , Navid Emamdoost , Stephen McCamant , and Kangjie Lu . 2021 . Understanding and Detecting Disordered Error Handling with Precise Function Pairing. In 30th USENIX Security Symposium (USENIX Security 21) . USENIX Association , 2041--2058. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/wu-qiushi Qiushi Wu, Aditya Pakki, Navid Emamdoost, Stephen McCamant, and Kangjie Lu. 2021. Understanding and Detecting Disordered Error Handling with Precise Function Pairing. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 2041--2058. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/wu-qiushi"},{"key":"e_1_3_2_2_39_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Xiao Yang","year":"2020","unstructured":"Yang Xiao , Bihuan Chen , Chendong Yu , Zhengzi Xu , Zimu Yuan , Feng Li , Binghong Liu , Yang Liu , Wei Huo , Wei Zou , and Wenchang Shi . 2020 . MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures . In 29th USENIX Security Symposium (USENIX Security 20) . USENIX Association, 1165--1182. Yang Xiao, Bihuan Chen, Chendong Yu, Zhengzi Xu, Zimu Yuan, Feng Li, Binghong Liu, Yang Liu, Wei Huo, Wei Zou, and Wenchang Shi. 2020. MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 1165--1182."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134018"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180178"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5466"},{"key":"e_1_3_2_2_43_1","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Yun Insu","year":"2016","unstructured":"Insu Yun , Changwoo Min , Xujie Si , Yeongjin Jang , Taesoo Kim , and Mayur Naik . 2016 . APISan: Sanitizing API Usages through Semantic Cross-Checking . In 25th USENIX Security Symposium (USENIX Security 16) . USENIX Association, Austin, TX, 363--378. Insu Yun, Changwoo Min, Xujie Si, Yeongjin Jang, Taesoo Kim, and Mayur Naik. 2016. APISan: Sanitizing API Usages through Semantic Cross-Checking. In 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, Austin, TX, 363--378."},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.24380"}],"event":{"name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Los Angeles CA USA","acronym":"CCS '22"},"container-title":["Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3560661","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3560661","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:48:59Z","timestamp":1750182539000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3560661"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":44,"alternative-id":["10.1145\/3548606.3560661","10.1145\/3548606"],"URL":"https:\/\/doi.org\/10.1145\/3548606.3560661","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}