Studying and understanding the tradeoffs between generality and reduction in software debloating
Existing approaches for program debloating often use a usage profile, typically provided as
a set of inputs, for identifying the features of a program to be preserved. Specifically, given a …
a set of inputs, for identifying the features of a program to be preserved. Specifically, given a …
A Broad Comparative Evaluation of Software Debloating Tools
MD Brown, A Meily, B Fairservice, A Sood… - 33rd USENIX Security …, 2024 - usenix.org
Software debloating tools seek to improve program security and performance by removing
unnecessary code, called bloat. While many techniques have been proposed, several …
unnecessary code, called bloat. While many techniques have been proposed, several …
SoK: A Tale of Reduction, Security, and Correctness-Evaluating Program Debloating Paradigms and Their Compositions
Automated software debloating of program source or binary code has tremendous potential
to improve both application performance and security. Unfortunately, measuring and …
to improve both application performance and security. Unfortunately, measuring and …
Automatic build repair for test cases using incompatible Java versions
CH Mak, SC Cheung - Information and Software Technology, 2024 - Elsevier
Context: Bug bisection is a common technique used to identify a revision that introduces a
bug or indirectly fixes a bug, and often involves executing multiple revisions of a project to …
bug or indirectly fixes a bug, and often involves executing multiple revisions of a project to …
Evaluating container debloaters
DOCKER containers have been widely used by organizations because they are lightweight
and single hardware can run multiple instances of a container. However, this ease of …
and single hardware can run multiple instances of a container. However, this ease of …
LeanBin: Harnessing Lifting and Recompilation to Debloat Binaries
To reduce the source of potential exploits, binary debloating or specialization tools are used
to remove unnecessary code from binaries. This paper presents a new binary debloating …
to remove unnecessary code from binaries. This paper presents a new binary debloating …
A call for removing variability
Software variability is largely accepted and explored in software engineering and seems to
have become a norm and a must, if only in the context of product lines. Yet, the removal of …
have become a norm and a must, if only in the context of product lines. Yet, the removal of …
SoK: A Broad Comparative Evaluation of Software Debloating Tools
MD Brown, A Meily, B Fairservice, A Sood… - arXiv preprint arXiv …, 2023 - arxiv.org
Software debloating tools seek to improve the program security and performance by
removing unnecessary code, called bloat. While many techniques have been proposed …
removing unnecessary code, called bloat. While many techniques have been proposed …
Adaptoring: Adapter Generation to Provide an Alternative API for a Library
L Reimann, G Kniesel-Wünsche - arXiv preprint arXiv:2401.07053, 2024 - arxiv.org
Third-party libraries are a cornerstone of fast application development. To enable efficient
use, libraries must provide a well-designed API. An obscure API instead slows down the …
use, libraries must provide a well-designed API. An obscure API instead slows down the …
[PDF][PDF] BLADE: Scalable Source Code Debloating Framework
Existing source code debloaters fall short due to low scalability and high runtime overhead
when applied in dynamic cloud settings, where instances are spun up on the fly. To address …
when applied in dynamic cloud settings, where instances are spun up on the fly. To address …