{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T18:40:53Z","timestamp":1763059253432,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,4]],"date-time":"2024-11-04T00:00:00Z","timestamp":1730678400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2220410, 2239615"],"award-info":[{"award-number":["2220410, 2239615"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Amazon"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,11,4]]},"DOI":"10.1145\/3698576.3698766","type":"proceedings-article","created":{"date-parts":[[2024,11,4]],"date-time":"2024-11-04T12:23:27Z","timestamp":1730723007000},"page":"23-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Veld: Verified Linux Drivers"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-4001-9105","authenticated-orcid":false,"given":"Xiangdong","family":"Chen","sequence":"first","affiliation":[{"name":"University of Utah"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7789-8005","authenticated-orcid":false,"given":"Zhaofeng","family":"Li","sequence":"additional","affiliation":[{"name":"University of Utah"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-0450-1297","authenticated-orcid":false,"given":"Jerry","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Utah"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8769-8373","authenticated-orcid":false,"given":"Anton","family":"Burtsev","sequence":"additional","affiliation":[{"name":"University of Utah"}]}],"member":"320","published-online":{"date-parts":[[2024,11,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"October","author":"Khoroshilov Alexey","year":"2012","unstructured":"Alexey Khoroshilov. Linux device-drivers verification challenges, October 2012."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87873-5_19"},{"key":"e_1_3_2_1_3_1","volume-title":"July","author":"Amani Sidney","year":"2011","unstructured":"Sidney Amani, Leonid Ryzhyk, Alastair F Donaldson, Gernot Heiser, Alexander Legg, and Yanjin Zhu. Static analysis of device drivers: We can do better! In Proceedings of the Second Asia-Pacific Workshop on Systems (APSys), July 2011."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/3358807.3358830"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the 30th USENIX Security Symposium (USENIX Security)","author":"Bai Jia-Ju","year":"2021","unstructured":"Jia-Ju Bai, Tuo Li, Kangjie Lu, and Shi-Min Hu. Static detection of unsafe DMA accesses in device drivers. In Proceedings of the 30th USENIX Security Symposium (USENIX Security), 2021."},{"key":"e_1_3_2_1_6_1","author":"Ball Thomas","year":"2006","unstructured":"Thomas Ball, Ella Bounimova, Byron Cook, Vladimir Levin, Jakob Lichtenberg, Con McGarvey, Bohus Ondrusek, Sriram K Rajamani, and Abdullah Ustuner. Thorough static analysis of device drivers. ACM SIGOPS Operating Systems Review, (4):73--85, 2006.","journal-title":"ACM SIGOPS Operating Systems Review, (4):73--85"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01090-4_32"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 4th international conference on Formal Methods for Components and Objects (FMCO)","author":"Barnett Mike","year":"2005","unstructured":"Mike Barnett, Bor-Yuh Evan Chang, Robert DeLine, Bart Jacobs, and K. Rustan M. Leino. Boogie: A modular reusable verifier for object-oriented programs. In Proceedings of the 4th international conference on Formal Methods for Components and Objects (FMCO), 2005."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.24688"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2908080.2908101"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502042"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134069"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ANCS.2019.8901892"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179298"},{"key":"e_1_3_2_1_16_1","volume-title":"December","author":"Jung Ralf","year":"2017","unstructured":"Ralf Jung, Jacques-Henri Jourdan, Robbert Krebbers, and Derek Dreyer. RustBelt: Securing the foundations of the Rust programming language. In number POPL, December 2017."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85114-1_12"},{"key":"e_1_3_2_1_18_1","volume-title":"rust-bindgen. https:\/\/github.com\/rust-lang\/rust-bindgen","author":"Programming Language The Rust","year":"2024","unstructured":"The Rust Programming Language. rust-bindgen. https:\/\/github.com\/rust-lang\/rust-bindgen, 2024."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3694715.3695952"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3586037"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17511-4_20"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/2663392"},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the 2024 USENIX Annual Technical Conference (ATC)","author":"Li Hongyu","year":"2024","unstructured":"Hongyu Li, Liwei Guo, Yexuan Yang, Shangguang Wang, and Mengwei Xu. An empirical study of Rust-for-Linux: The success, dissatisfaction, and compromise. In Proceedings of the 2024 USENIX Annual Technical Conference (ATC), July 2024."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3527313"},{"volume-title":"Linux Kernel Driver DataBase. https:\/\/cateee.net\/lkddb\/","year":"2019","key":"e_1_3_2_1_25_1","unstructured":"LKDDb: Linux Kernel Driver DataBase. https:\/\/cateee.net\/lkddb\/, 2019."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534226"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1289927.1289937"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950401"},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the 11th USENIX Workshop on Offensive Technologies (WOOT)","author":"Patrick-Evans James","year":"2017","unstructured":"James Patrick-Evans, Lorenzo Cavallaro, and Johannes Kinder. POTUS: Probing off-the-shelf USB drivers with symbolic fault injection. In Proceedings of the 11th USENIX Workshop on Offensive Technologies (WOOT), 2017."},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the 29th USENIX Security Symposium (USENIX Security)","author":"Peng Hui","year":"2020","unstructured":"Hui Peng and Mathias Payer. USBFuzz: A framework for fuzzing USB drivers by device emulation. In Proceedings of the 29th USENIX Security Symposium (USENIX Security), 2020."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3623759.3624544"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/1770498.1770525"},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI)","author":"Renzelmann Matthew J","year":"2012","unstructured":"Matthew J Renzelmann, Asim Kadav, and Michael M Swift. SymDrive: Testing drivers without devices. In Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2012."},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of the 31st USENIX Security Symposium (USENIX Security)","author":"Shen Zekun","year":"2022","unstructured":"Zekun Shen, Ritik Roongta, and Brendan Dolan-Gavitt. Drifuzz: Harvesting bugs in device drivers from golden seeds. In Proceedings of the 31st USENIX Security Symposium (USENIX Security), 2022."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2837614.2837655"},{"key":"e_1_3_2_1_36_1","volume-title":"Formal verification of Linux device drivers. Master's thesis","author":"Witkowski Thomas","year":"2007","unstructured":"Thomas Witkowski. Formal verification of Linux device drivers. Master's thesis, Dresden University of Technology, 2007."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179293"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.24345"},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings of the 18th USENIX Symposium on Operating Systems Design and Implementation (OSDI)","author":"Zhou Ziqiao","year":"2024","unstructured":"Ziqiao Zhou, Anjali, Weiteng Chen, Sishuai Gong, Chris Hawblitzel, and Weidong Cui. VeriSMo: A verified security module for confidential VMs. In Proceedings of the 18th USENIX Symposium on Operating Systems Design and Implementation (OSDI), July 2024."}],"event":{"name":"SOSP '24: ACM SIGOPS 30th Symposium on Operating Systems Principles","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Austin TX USA","acronym":"SOSP '24"},"container-title":["Proceedings of the 2nd Workshop on Kernel Isolation, Safety and Verification"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3698576.3698766","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3698576.3698766","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T20:34:10Z","timestamp":1755981250000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3698576.3698766"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,4]]},"references-count":39,"alternative-id":["10.1145\/3698576.3698766","10.1145\/3698576"],"URL":"https:\/\/doi.org\/10.1145\/3698576.3698766","relation":{},"subject":[],"published":{"date-parts":[[2024,11,4]]},"assertion":[{"value":"2024-11-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}