{"id":"https://openalex.org/W7151540251","doi":"https://doi.org/10.48550/arxiv.2604.04527","title":"ENCRUST: Encapsulated Substitution and Agentic Refinement on a Live Scaffold for Safe C-to-Rust Translation","display_name":"ENCRUST: Encapsulated Substitution and Agentic Refinement on a Live Scaffold for Safe C-to-Rust Translation","publication_year":2026,"publication_date":"2026-04-06","ids":{"openalex":"https://openalex.org/W7151540251","doi":"https://doi.org/10.48550/arxiv.2604.04527"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2604.04527","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.04527","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2604.04527","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5133073884","display_name":"Hohyun Sim","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Sim, Hohyun","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024592528","display_name":"Hyeonjoong Cho","orcid":"https://orcid.org/0000-0003-1487-895X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Cho, Hyeonjoong","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5133074877","display_name":"Ali Shokri","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shokri, Ali","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089294104","display_name":"Zhoulai Fu","orcid":"https://orcid.org/0000-0003-2073-0564"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Fu, Zhoulai","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5067528153","display_name":"Binoy Ravindran","orcid":"https://orcid.org/0000-0002-8663-739X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ravindran, Binoy","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5133073884"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.4339999854564667,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.4339999854564667,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10126","display_name":"Logic, programming, and type systems","score":0.288100004196167,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.07959999889135361,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/code-refactoring","display_name":"Code refactoring","score":0.5997999906539917},{"id":"https://openalex.org/keywords/codebase","display_name":"Codebase","score":0.5895000100135803},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.498199999332428},{"id":"https://openalex.org/keywords/decoy","display_name":"Decoy","score":0.45399999618530273},{"id":"https://openalex.org/keywords/heuristics","display_name":"Heuristics","score":0.4375},{"id":"https://openalex.org/keywords/pipeline","display_name":"Pipeline (software)","score":0.4129999876022339},{"id":"https://openalex.org/keywords/scaffold","display_name":"Scaffold","score":0.39079999923706055},{"id":"https://openalex.org/keywords/backup","display_name":"Backup","score":0.3756999969482422}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6552000045776367},{"id":"https://openalex.org/C152752567","wikidata":"https://www.wikidata.org/wiki/Q116877","display_name":"Code refactoring","level":3,"score":0.5997999906539917},{"id":"https://openalex.org/C51929080","wikidata":"https://www.wikidata.org/wiki/Q2425187","display_name":"Codebase","level":3,"score":0.5895000100135803},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.498199999332428},{"id":"https://openalex.org/C2779179475","wikidata":"https://www.wikidata.org/wiki/Q3545649","display_name":"Decoy","level":3,"score":0.45399999618530273},{"id":"https://openalex.org/C127705205","wikidata":"https://www.wikidata.org/wiki/Q5748245","display_name":"Heuristics","level":2,"score":0.4375},{"id":"https://openalex.org/C43521106","wikidata":"https://www.wikidata.org/wiki/Q2165493","display_name":"Pipeline (software)","level":2,"score":0.4129999876022339},{"id":"https://openalex.org/C89429830","wikidata":"https://www.wikidata.org/wiki/Q735710","display_name":"Scaffold","level":2,"score":0.39079999923706055},{"id":"https://openalex.org/C2780945871","wikidata":"https://www.wikidata.org/wiki/Q194274","display_name":"Backup","level":2,"score":0.3756999969482422},{"id":"https://openalex.org/C2778565505","wikidata":"https://www.wikidata.org/wiki/Q2207566","display_name":"Spec#","level":2,"score":0.33390000462532043},{"id":"https://openalex.org/C2780154230","wikidata":"https://www.wikidata.org/wiki/Q513420","display_name":"Undo","level":2,"score":0.33079999685287476},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.32919999957084656},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.3140000104904175},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3109000027179718},{"id":"https://openalex.org/C147494362","wikidata":"https://www.wikidata.org/wiki/Q2078905","display_name":"Troubleshooting","level":2,"score":0.3107999861240387},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.29269999265670776},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.27900001406669617},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.27619999647140503},{"id":"https://openalex.org/C94966114","wikidata":"https://www.wikidata.org/wiki/Q29256","display_name":"Black box","level":2,"score":0.2736000120639801},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.2736000120639801},{"id":"https://openalex.org/C2778220771","wikidata":"https://www.wikidata.org/wiki/Q1522579","display_name":"Substitution (logic)","level":2,"score":0.26750001311302185},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.26159998774528503},{"id":"https://openalex.org/C113843644","wikidata":"https://www.wikidata.org/wiki/Q901882","display_name":"Interface (matter)","level":4,"score":0.26030001044273376},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.25440001487731934},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2542000114917755},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.25040000677108765}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2604.04527","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.04527","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2604.04527","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.04527","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"We":[0,206],"present":[1],"Encapsulated":[2],"Substitution":[3],"and":[4,97,131,189,214],"Agentic":[5],"Refinement":[6],"on":[7,154,197,209],"a":[8,15,123,132,141,202],"Live":[9],"Scaffold":[10],"for":[11,18],"Safe":[12],"C-to-Rust":[13],"Translation,":[14],"two-phase":[16],"pipeline":[17],"translating":[19],"real-world":[20,75],"C":[21],"projects":[22],"to":[23,41,70],"safe":[24,133],"Rust.":[25],"Existing":[26],"approaches":[27],"either":[28],"produce":[29,71],"unsafe":[30,48,177],"output":[31,73],"without":[32,156],"memory-safety":[33],"guarantees":[34],"or":[35,46],"translate":[36],"functions":[37],"in":[38],"isolation,":[39],"failing":[40],"detect":[42],"cross-unit":[43],"type":[44,62,149],"mismatches":[45],"handle":[47],"constructs":[49,178],"requiring":[50],"whole-program":[51],"reasoning.":[52],"Furthermore,":[53],"function-level":[54],"LLM":[55,139,194],"pipelines":[56],"require":[57],"coordinated":[58,157],"caller":[59,158],"updates":[60],"when":[61],"signatures":[63],"change,":[64],"while":[65,229],"project-scale":[66],"systems":[67],"often":[68],"fail":[69],"compilable":[72],"under":[74,201],"dependency":[76],"complexity.":[77],"Encrust":[78,208],"addresses":[79],"these":[80],"limitations":[81],"by":[82,137],"decoupling":[83],"boundary":[84],"adaptation":[85],"from":[86,217],"function":[87,112,135],"logic":[88],"via":[89],"an":[90,114,193],"Application":[91],"Binary":[92],"Interface":[93],"(ABI)-preserving":[94],"wrapper":[95,116,163,187],"pattern":[96],"validating":[98],"each":[99,111],"intermediate":[100],"state":[101],"against":[102],"the":[103,127,138,198,218],"integrated":[104],"codebase.":[105],"Phase":[106,172],"1":[107],"(Encapsulated":[108],"Substitution)":[109],"translates":[110],"using":[113,192],"ABI-preserving":[115],"that":[117],"splits":[118],"it":[119],"into":[120],"two":[121],"components:":[122],"caller-transparent":[124],"shim":[125],"retaining":[126],"original":[128],"raw-pointer":[129],"signature,":[130],"inner":[134],"targeted":[136],"with":[140,151],"clean,":[142],"scope-limited":[143],"prompt.":[144],"This":[145],"enables":[146],"independent":[147],"per-function":[148,180],"changes":[150],"automatic":[152],"rollback":[153],"failure,":[155],"updates.":[159],"A":[160],"deterministic,":[161],"type-directed":[162],"elimination":[164],"pass":[165],"then":[166],"removes":[167],"wrappers":[168],"after":[169],"successful":[170],"translation.":[171],"2":[173],"(Agentic":[174],"Refinement)":[175],"resolves":[176],"beyond":[179],"scope,":[181],"including":[182],"static":[183],"mut":[184],"globals,":[185],"skipped":[186],"pairs,":[188],"failed":[190],"translations,":[191],"agent":[195],"operating":[196],"whole":[199],"codebase":[200],"baseline-aware":[203],"verification":[204],"gate.":[205],"evaluate":[207],"7":[210],"GNU":[211],"Coreutils":[212],"programs":[213,228],"8":[215],"libraries":[216],"Laertes":[219],"benchmark,":[220],"showing":[221],"substantial":[222],"unsafe-construct":[223],"reduction":[224],"across":[225],"all":[226],"15":[227],"maintaining":[230],"full":[231],"test-vector":[232],"correctness.":[233]},"counts_by_year":[],"updated_date":"2026-04-08T06:07:18.267832","created_date":"2026-04-08T00:00:00"}
