{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T18:40:01Z","timestamp":1755974401295,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T00:00:00Z","timestamp":1743292800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,3,30]]},"DOI":"10.1145\/3722041.3723102","type":"proceedings-article","created":{"date-parts":[[2025,4,2]],"date-time":"2025-04-02T07:16:25Z","timestamp":1743578185000},"page":"63-69","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["rustc++: Facilitating Advanced Analysis of Rust Code"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-1501-4933","authenticated-orcid":false,"given":"Antonis","family":"Louka","sequence":"first","affiliation":[{"name":"University of Cyprus, Nicosia, Cyprus"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1665-803X","authenticated-orcid":false,"given":"Georgios","family":"Portokalidis","sequence":"additional","affiliation":[{"name":"IMDEA Software Institute, Madrid, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8759-3261","authenticated-orcid":false,"given":"Elias","family":"Athanasopoulos","sequence":"additional","affiliation":[{"name":"University of Cyprus, Nicosia, Cyprus"}]}],"member":"320","published-online":{"date-parts":[[2025,4,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428204"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3477132.3483570"},{"key":"e_1_3_2_1_3_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Bang Inyoung","year":"2023","unstructured":"Inyoung Bang, Martin Kayondo, HyunGon Moon, and Yunheung Paek. 2023. TRust: A Compilation Framework for In-process Isolation to Protect Safe Rust against Untrusted Code. In 32nd USENIX Security Symposium (USENIX Security 23). USENIX Association, Anaheim, CA, 6947--6964. https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/bang"},{"key":"e_1_3_2_1_4_1","unstructured":"Rust Fuzz Book. 2025. Fuzz Testing of Rust code. https:\/\/rust-fuzz.github.io\/book\/cargo-fuzz.html"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3542948"},{"key":"e_1_3_2_1_6_1","unstructured":"Rust Secure Code Working Group. 2024. RustSec Advisory Database. https:\/\/rustsec.org\/"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3492321.3519582"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/977395.977673"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO51591.2021.9370308"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484541"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3642974.3652281"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Samuel Mergendahl Nathan Burow and Hamed Okhravi. 2022. Cross-language attacks. https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2022-78-paper.pdf","DOI":"10.14722\/ndss.2022.24078"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00258"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3418898"},{"key":"e_1_3_2_1_15_1","volume-title":"MLIR: Multi-Level Intermediate Representation. https:\/\/mlir.llvm.org\/","author":"LLVM","year":"2024","unstructured":"LLVM project. 2024. MLIR: Multi-Level Intermediate Representation. https:\/\/mlir.llvm.org\/"},{"key":"e_1_3_2_1_16_1","volume-title":"MLIR: Multi-Level Intermediate Representation. https:\/\/github.com\/llvm\/llvm-project\/tree\/main\/mlir","author":"LLVM","year":"2024","unstructured":"LLVM project. 2024. MLIR: Multi-Level Intermediate Representation. https:\/\/github.com\/llvm\/llvm-project\/tree\/main\/mlir"},{"key":"e_1_3_2_1_17_1","unstructured":"rust-borrow checker. 2021. Rust Compiler Development Guide. https:\/\/rustc-dev-guide.rust- lang.org\/borrow_check.html."},{"key":"e_1_3_2_1_18_1","unstructured":"Rust-Lang. 2021. Rust Driver. https:\/\/rustc-dev-guide.rust-lang.org\/rustc-driver\/intro.html#rustc_driver"},{"key":"e_1_3_2_1_19_1","unstructured":"Rust-Lang. 2021. Rust HIR. https:\/\/rustc-dev-guide.rust-lang.org\/hir.html"},{"key":"e_1_3_2_1_20_1","unstructured":"Rust-Lang. 2021. Rust Interface. https:\/\/rustc-dev-guide.rust-lang.org\/rustc-driver\/intro.html#rustc_interface"},{"key":"e_1_3_2_1_21_1","unstructured":"Rust-Lang. 2021. Rust MIR. https:\/\/rustc-dev-guide.rust-lang.org\/mir\/index.html"},{"key":"e_1_3_2_1_22_1","unstructured":"Rust-Lang. 2021. Rust THIR. https:\/\/rustc-dev-guide.rust-lang.org\/thir.html"},{"key":"e_1_3_2_1_23_1","unstructured":"Rust-Lang. 2024. Miri: an Undefined Behavior tool for Rust (MIR interpreter). https:\/\/github.com\/rust-lang\/miri"},{"key":"e_1_3_2_1_24_1","unstructured":"Rust-Lang. 2024. The Rust Programming Language: Unsafe Superpowers. https:\/\/doc.rust-lang.org\/book\/ch19-01-unsafe-rust.html#unsafe-superpowers"},{"key":"e_1_3_2_1_25_1","unstructured":"Rust-Lang. 2025. Rust Compiler Agnostic Backend. https:\/\/rustc-dev-guide.rust-lang.org\/backend\/backend-agnostic.html"},{"key":"e_1_3_2_1_26_1","unstructured":"Rust-Lang. 2025. Rust Compiler LLVM Backend. https:\/\/rustc-dev-guide.rust-lang.org\/backend\/backend-agnostic.html#refactoring-of-rustc_codegen_llvm"},{"key":"e_1_3_2_1_27_1","unstructured":"Rust-Lang. 2025. Rust Compiler SourceInfo struct. https:\/\/rustc-dev-guide.rust-lang.org\/hir.html"},{"key":"e_1_3_2_1_28_1","unstructured":"Rust-Lang. 2025. Rust Compiler Span struct. https:\/\/doc.rust-lang.org\/nightly\/nightly- rustc\/rustc_span\/span_encoding\/struct.Span.html"},{"key":"e_1_3_2_1_29_1","unstructured":"Rust-Lang. 2025. Rust Compiler Statement struct. https:\/\/doc.rust-lang.org\/nightly\/nightly- rustc\/rustc_middle\/mir\/struct.Statement.html"},{"key":"e_1_3_2_1_30_1","unstructured":"Rust-Lang. 2025. Rust Compiler StatementKind struct. https:\/\/doc.rust-lang.org\/nightly\/nightly-rustc\/rustc_middle\/mir\/enum.StatementKind.html"},{"key":"e_1_3_2_1_31_1","unstructured":"Rust-Lang. 2025. Rust Compiler Terminator struct. https:\/\/doc.rust-lang.org\/nightly\/nightly- rustc\/rustc_middle\/mir\/terminator\/struct.Terminator.html"},{"key":"e_1_3_2_1_32_1","volume-title":"AddressSanitizer: A Fast Address Sanity Checker. In 2012 USENIX Annual Technical Conference (USENIX ATC 12)","author":"Serebryany Konstantin","year":"2012","unstructured":"Konstantin Serebryany, Derek Bruening, Alexander Potapenko, and Dmitriy Vyukov. 2012. AddressSanitizer: A Fast Address Sanity Checker. In 2012 USENIX Annual Technical Conference (USENIX ATC 12). USENIX Association, Boston, MA, 309--318. https:\/\/www.usenix.org\/conference\/atc12\/technical-sessions\/presentation\/serebryany"},{"key":"e_1_3_2_1_33_1","unstructured":"Speykious. 2023. Blazingly fast memory vulnerabilities written in safe rust. https:\/\/github.com\/Speykious\/cve-rs."},{"key":"e_1_3_2_1_34_1","unstructured":"Rust Foundation Team. 2024. Unsafe Rust in the Wild: Notes on the Current State of Unsafe Rust. https:\/\/rustfoundation.org\/media\/unsafe-rust-in-the-wild-notes-on-the-current-state-of-unsafe-rust\/"},{"key":"e_1_3_2_1_35_1","unstructured":"The Rust Project Developers. 2022. The Rust Programming Language: References and Borrowing. Accessed on November 20 2023."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639102"}],"event":{"name":"EuroSys '25: Twentieth European Conference on Computer Systems","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Rotterdam Netherlands","acronym":"EuroSys '25"},"container-title":["Proceedings of the 18th European Workshop on Systems Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3722041.3723102","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3722041.3723102","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T18:14:28Z","timestamp":1755972868000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3722041.3723102"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,30]]},"references-count":36,"alternative-id":["10.1145\/3722041.3723102","10.1145\/3722041"],"URL":"https:\/\/doi.org\/10.1145\/3722041.3723102","relation":{},"subject":[],"published":{"date-parts":[[2025,3,30]]},"assertion":[{"value":"2025-04-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}