A Comprehensive Survey of Benchmarks for Improvement of Software's Non-Functional Properties
Despite recent increase in research on improvement of non-functional properties of
software, such as energy usage or program size, there is a lack of standard benchmarks for …
software, such as energy usage or program size, there is a lack of standard benchmarks for …
FaaSLight: General Application-level Cold-start Latency Optimization for Function-as-a-Service in Serverless Computing
Serverless computing is a popular cloud computing paradigm that frees developers from
server management. Function-as-a-Service (FaaS) is the most popular implementation of …
server management. Function-as-a-Service (FaaS) is the most popular implementation of …
Slimium: debloating the chromium browser with feature subsetting
Today, a web browser plays a crucial role in offering a broad spectrum of web experiences.
The most popular browser, Chromium, has become an extremely complex application to …
The most popular browser, Chromium, has become an extremely complex application to …
Studying and understanding the tradeoffs between generality and reduction in software debloating
Existing approaches for program debloating often use a usage profile, typically provided as
a set of inputs, for identifying the features of a program to be preserved. Specifically, given a …
a set of inputs, for identifying the features of a program to be preserved. Specifically, given a …
Is less really more? towards better metrics for measuring security improvements realized through software debloating
Nearly all modern software suffers from bloat that negatively impacts its performance and
security. To combat this problem, several automated techniques have been proposed to …
security. To combat this problem, several automated techniques have been proposed to …
A broad comparative evaluation of software debloating tools
MD Brown, A Meily, B Fairservice, A Sood… - 33rd USENIX Security …, 2024 - usenix.org
Software debloating tools seek to improve program security and performance by removing
unnecessary code, called bloat. While many techniques have been proposed, several …
unnecessary code, called bloat. While many techniques have been proposed, several …
Lightweight, multi-stage, compiler-assisted application specialization
Program debloating aims to enhance the performance and reduce the attack surface of
bloated applications. Several techniques have been recently proposed to specialize …
bloated applications. Several techniques have been recently proposed to specialize …
C3PO: large-scale study of covert monitoring of C&C servers via over-permissioned protocol infiltration
Current techniques to monitor botnets towards disruption or takedown are likely to result in
inaccurate data gathered about the botnet or be detected by C&C orchestrators. Seeking a …
inaccurate data gathered about the botnet or be detected by C&C orchestrators. Seeking a …
Guided feature identification and removal for resource-constrained firmware
IoT firmware oftentimes incorporates third-party components, such as network-oriented
middleware and media encoders/decoders. These components consist of large and mature …
middleware and media encoders/decoders. These components consist of large and mature …
JSLIM: Reducing the known vulnerabilities of JavaScript application by debloating
R Ye, L Liu, S Hu, F Zhu, J Yang, F Wang - International Symposium on …, 2021 - Springer
As the complexity of software projects increases, more and more developers choose to
package various external dependency libraries into software projects to simplify software …
package various external dependency libraries into software projects to simplify software …