A Comprehensive Survey of Benchmarks for Improvement of Software's Non-Functional Properties

A Blot, J Petke - ACM Computing Surveys, 2025 - dl.acm.org
Despite recent increase in research on improvement of non-functional properties of
software, such as energy usage or program size, there is a lack of standard benchmarks for …

Temporal system call specialization for attack surface reduction

S Ghavamnia, T Palit, S Mishra… - 29th USENIX Security …, 2020 - usenix.org
Attack surface reduction through the removal of unnecessary application features and code
is a promising technique for improving security without incurring any additional overhead …

Confine: Automated system call policy generation for container attack surface reduction

S Ghavamnia, T Palit, A Benameur… - … on Research in Attacks …, 2020 - usenix.org
Reducing the attack surface of the OS kernel is a promising defense-in-depth approach for
mitigating the fragile isolation guarantees of container environments. In contrast to …

Sysfilter: Automated system call filtering for commodity software

N DeMarinis, K Williams-King, D **… - … on Research in Attacks …, 2020 - usenix.org
Modern OSes provide a rich set of services to applications, primarily accessible via the
system call API, to support the ever growing functionality of contemporary software …

Nibbler: debloating binary shared libraries

I Agadakos, D **, D Williams-King… - Proceedings of the 35th …, 2019 - dl.acm.org
Developers today have access to an arsenal of toolkits and libraries for rapid application
prototy**. However, when an application loads a library, the entirety of that library's code …

C2c: Fine-grained configuration-driven system call filtering

S Ghavamnia, T Palit, M Polychronakis - Proceedings of the 2022 ACM …, 2022 - dl.acm.org
Configuration options allow users to customize application features according to the desired
requirements. While the code that corresponds to disabled features is never executed, it still …

Less is more: Quantifying the security benefits of debloating web applications

BA Azad, P Laperdrix, N Nikiforakis - 28th USENIX Security Symposium …, 2019 - usenix.org
As software becomes increasingly complex, its attack surface expands enabling the
exploitation of a wide range of vulnerabilities. Web applications are no exception since …

A longitudinal analysis of bloated java dependencies

C Soto-Valero, T Durieux, B Baudry - Proceedings of the 29th ACM Joint …, 2021 - dl.acm.org
We study the evolution and impact of bloated dependencies in a single software ecosystem:
Java/Maven. Bloated dependencies are third-party libraries that are packaged in the …

Slimium: debloating the chromium browser with feature subsetting

C Qian, H Koo, CS Oh, T Kim, W Lee - Proceedings of the 2020 ACM …, 2020 - dl.acm.org
Today, a web browser plays a crucial role in offering a broad spectrum of web experiences.
The most popular browser, Chromium, has become an extremely complex application to …

Supply-chain vulnerability elimination via active learning and regeneration

N Vasilakis, A Benetopoulos, S Handa… - Proceedings of the …, 2021 - dl.acm.org
Software supply-chain attacks target components that are integrated into client applications.
Such attacks often target widely-used components, with the attack taking place via …