A broad comparative evaluation of software debloating tools

MD Brown, A Meily, B Fairservice, A Sood… - 33rd USENIX Security …, 2024 - usenix.org
Software debloating tools seek to improve program security and performance by removing
unnecessary code, called bloat. While many techniques have been proposed, several …

[PDF][PDF] Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis

P Li, W Meng, M Zhang, C Wang… - Proceedings of the 45th …, 2024 - cse.cuhk.edu.hk
Symbolic execution for dynamic web applications is challenging due to their multilingual
nature. Prior solutions often fall short in limited syntax support and excessive engineering …

SoK: A Broad Comparative Evaluation of Software Debloating Tools

MD Brown, A Meily, B Fairservice, A Sood… - arxiv preprint arxiv …, 2023 - arxiv.org
Software debloating tools seek to improve the program security and performance by
removing unnecessary code, called bloat. While many techniques have been proposed …

Fuzzing the PHP Interpreter via Dataflow Fusion

Y Jiang, C Zhang, B Ruan, J Liu, M Rigger… - arxiv preprint arxiv …, 2024 - arxiv.org
PHP, a dominant scripting language in web development, powers a vast range of websites,
from personal blogs to major platforms. While existing research primarily focuses on PHP …

An empirical study of bloated dependencies in CommonJS packages

Y Liu, D Tiwari, C Bogdan, B Baudry - arxiv preprint arxiv:2405.17939, 2024 - arxiv.org
JavaScript packages are notoriously prone to bloat, a factor that significantly impacts the
performance and maintainability of web applications. While web bundlers and tree-shaking …

Bloat beneath Python's Scales: A Fine-Grained Inter-Project Dependency Analysis

GP Drosos, T Sotiropoulos, D Spinellis… - Proceedings of the …, 2024 - dl.acm.org
Modern programming languages promote software reuse via package managers that
facilitate the integration of inter-dependent software libraries. Software reuse comes with the …

[PDF][PDF] Poster: Discovering Authentication Bypass Vulnerabilities in IoT Devices through Guided Concolic Execution

JW Huang, NJ Tsai, SM Cheng - ndss-symposium.org
The severity of attacks on IoT devices underscores the pressing need for efficient and
effective vulnerability discovery methods. Specifically, authentication-related vulnerabilities …

Detecting and Removing Bloated Dependencies in Commonjs Packages

Y Liu, D Tiwari, C Bogdan, B Baudry - Available at SSRN 4960057 - papers.ssrn.com
JavaScript packages are notoriously prone to bloat, a factor that significantly impacts the
performance and maintainability of web applications. While web bundlers can mitigate this …