A broad comparative evaluation of software debloating tools
MD Brown, A Meily, B Fairservice, A Sood… - 33rd USENIX Security …, 2024 - usenix.org
Software debloating tools seek to improve program security and performance by removing
unnecessary code, called bloat. While many techniques have been proposed, several …
unnecessary code, called bloat. While many techniques have been proposed, several …
[PDF][PDF] Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis
Symbolic execution for dynamic web applications is challenging due to their multilingual
nature. Prior solutions often fall short in limited syntax support and excessive engineering …
nature. Prior solutions often fall short in limited syntax support and excessive engineering …
SoK: A Broad Comparative Evaluation of Software Debloating Tools
MD Brown, A Meily, B Fairservice, A Sood… - arxiv preprint arxiv …, 2023 - arxiv.org
Software debloating tools seek to improve the program security and performance by
removing unnecessary code, called bloat. While many techniques have been proposed …
removing unnecessary code, called bloat. While many techniques have been proposed …
Fuzzing the PHP Interpreter via Dataflow Fusion
PHP, a dominant scripting language in web development, powers a vast range of websites,
from personal blogs to major platforms. While existing research primarily focuses on PHP …
from personal blogs to major platforms. While existing research primarily focuses on PHP …
An empirical study of bloated dependencies in CommonJS packages
JavaScript packages are notoriously prone to bloat, a factor that significantly impacts the
performance and maintainability of web applications. While web bundlers and tree-shaking …
performance and maintainability of web applications. While web bundlers and tree-shaking …
Bloat beneath Python's Scales: A Fine-Grained Inter-Project Dependency Analysis
Modern programming languages promote software reuse via package managers that
facilitate the integration of inter-dependent software libraries. Software reuse comes with the …
facilitate the integration of inter-dependent software libraries. Software reuse comes with the …
[PDF][PDF] Poster: Discovering Authentication Bypass Vulnerabilities in IoT Devices through Guided Concolic Execution
JW Huang, NJ Tsai, SM Cheng - ndss-symposium.org
The severity of attacks on IoT devices underscores the pressing need for efficient and
effective vulnerability discovery methods. Specifically, authentication-related vulnerabilities …
effective vulnerability discovery methods. Specifically, authentication-related vulnerabilities …
Detecting and Removing Bloated Dependencies in Commonjs Packages
JavaScript packages are notoriously prone to bloat, a factor that significantly impacts the
performance and maintainability of web applications. While web bundlers can mitigate this …
performance and maintainability of web applications. While web bundlers can mitigate this …