Automatic specialization of third-party java dependencies

C Soto-Valero, D Tiwari, T Toady… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Large-scale code reuse significantly reduces both development costs and time. However,
the massive share of third-party code in software projects poses new challenges, especially …

Eliminating vulnerabilities by disabling unwanted functionality in binary programs

M Mansouri, J Xu, G Portokalidis - Proceedings of the 2023 ACM Asia …, 2023 - dl.acm.org
Driven by application diversification and market needs, software systems are integrating
new features rapidly. However, this “feature creep” can compromise software security, as …

SoK: A Broad Comparative Evaluation of Software Debloating Tools

MD Brown, A Meily, B Fairservice, A Sood… - arXiv preprint arXiv …, 2023 - arxiv.org
Software debloating tools seek to improve the program security and performance by
removing unnecessary code, called bloat. While many techniques have been proposed …

SoK: Software Debloating Landscape and Future Directions

M Alhanahnah, Y Boshmaf, A Gehani - arXiv preprint arXiv:2407.11259, 2024 - arxiv.org
Software debloating seeks to mitigate security risks and improve performance by eliminating
unnecessary code. In recent years, a plethora of debloating tools have been developed …

Machine Learning Systems are Bloated and Vulnerable

H Zhang, M Alhanahnah, FA Ahmed, D Fatih… - Proceedings of the …, 2024 - dl.acm.org
Today's software is bloated with both code and features that are not used by most users.
This bloat is prevalent across the entire software stack, from operating systems and …

Debloating Java Dependencies

C Soto Valero - 2023 - diva-portal.org
Software systems have a natural tendency to grow in size and complexity. A part of this
growth comes with the addition of new features or bug fixes, while another part is due to …

Practical Exploit Mitigation Design Against Code Re-Use and System Call Abuse Attacks

CS Jelesnianski - 2023 - vtechworks.lib.vt.edu
Over the years, many defense techniques have been proposed by the security community.
Even so, few have been adopted by the general public and deployed in production. This …

[PDF][PDF] Eliminating Vulnerabilities by Disabling Unwanted Functionality in Binary Programs

M Mansouri, J Xu, G Portokalidis - 2023 - mohamadmansouri.github.io
Driven by application diversification and market needs, software systems are integrating
new features rapidly. However, this “feature creep” can compromise software security, as …