A Comprehensive Survey of Benchmarks for Improvement of Software's Non-Functional Properties
Despite recent increase in research on improvement of non-functional properties of
software, such as energy usage or program size, there is a lack of standard benchmarks for …
software, such as energy usage or program size, there is a lack of standard benchmarks for …
Temporal system call specialization for attack surface reduction
Attack surface reduction through the removal of unnecessary application features and code
is a promising technique for improving security without incurring any additional overhead …
is a promising technique for improving security without incurring any additional overhead …
Confine: Automated system call policy generation for container attack surface reduction
Reducing the attack surface of the OS kernel is a promising defense-in-depth approach for
mitigating the fragile isolation guarantees of container environments. In contrast to …
mitigating the fragile isolation guarantees of container environments. In contrast to …
Sysfilter: Automated system call filtering for commodity software
N DeMarinis, K Williams-King, D **… - … on Research in Attacks …, 2020 - usenix.org
Modern OSes provide a rich set of services to applications, primarily accessible via the
system call API, to support the ever growing functionality of contemporary software …
system call API, to support the ever growing functionality of contemporary software …
Nibbler: debloating binary shared libraries
Developers today have access to an arsenal of toolkits and libraries for rapid application
prototy**. However, when an application loads a library, the entirety of that library's code …
prototy**. However, when an application loads a library, the entirety of that library's code …
C2c: Fine-grained configuration-driven system call filtering
Configuration options allow users to customize application features according to the desired
requirements. While the code that corresponds to disabled features is never executed, it still …
requirements. While the code that corresponds to disabled features is never executed, it still …
Less is more: Quantifying the security benefits of debloating web applications
As software becomes increasingly complex, its attack surface expands enabling the
exploitation of a wide range of vulnerabilities. Web applications are no exception since …
exploitation of a wide range of vulnerabilities. Web applications are no exception since …
A longitudinal analysis of bloated java dependencies
We study the evolution and impact of bloated dependencies in a single software ecosystem:
Java/Maven. Bloated dependencies are third-party libraries that are packaged in the …
Java/Maven. Bloated dependencies are third-party libraries that are packaged in the …
Slimium: debloating the chromium browser with feature subsetting
Today, a web browser plays a crucial role in offering a broad spectrum of web experiences.
The most popular browser, Chromium, has become an extremely complex application to …
The most popular browser, Chromium, has become an extremely complex application to …
Supply-chain vulnerability elimination via active learning and regeneration
Software supply-chain attacks target components that are integrated into client applications.
Such attacks often target widely-used components, with the attack taking place via …
Such attacks often target widely-used components, with the attack taking place via …