Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Confine: Automated system call policy generation for container attack surface reduction
Reducing the attack surface of the OS kernel is a promising defense-in-depth approach for
mitigating the fragile isolation guarantees of container environments. In contrast to …
mitigating the fragile isolation guarantees of container environments. In contrast to …
Temporal system call specialization for attack surface reduction
Attack surface reduction through the removal of unnecessary application features and code
is a promising technique for improving security without incurring any additional overhead …
is a promising technique for improving security without incurring any additional overhead …
FaaSLight: General Application-level Cold-start Latency Optimization for Function-as-a-Service in Serverless Computing
Serverless computing is a popular cloud computing paradigm that frees developers from
server management. Function-as-a-Service (FaaS) is the most popular implementation of …
server management. Function-as-a-Service (FaaS) is the most popular implementation of …
Oddfuzz: Discovering java deserialization vulnerabilities via structure-aware directed greybox fuzzing
Java deserialization vulnerability is a severe threat in practice. Researchers have proposed
static analysis solutions to locate candidate vulnerabilities and fuzzing solutions to generate …
static analysis solutions to locate candidate vulnerabilities and fuzzing solutions to generate …
A comprehensive study of bloated dependencies in the maven ecosystem
Build automation tools and package managers have a profound influence on software
development. They facilitate the reuse of third-party libraries, support a clear separation …
development. They facilitate the reuse of third-party libraries, support a clear separation …
Improving java deserialization gadget chain mining via overriding-guided object generation
Java (de) serialization is prone to causing security-critical vulnerabilities that attackers can
invoke existing methods (gadgets) on the application's classpath to construct a gadget chain …
invoke existing methods (gadgets) on the application's classpath to construct a gadget chain …
A longitudinal analysis of bloated java dependencies
We study the evolution and impact of bloated dependencies in a single software ecosystem:
Java/Maven. Bloated dependencies are third-party libraries that are packaged in the …
Java/Maven. Bloated dependencies are third-party libraries that are packaged in the …
Mininode: Reducing the attack surface of node. js applications
JavaScript has gained traction as a programming language that qualifies for both the client-
side and the server-side logic of applications. A new ecosystem of server-side code written …
side and the server-side logic of applications. A new ecosystem of server-side code written …
Jack-in-the-box: An empirical study of javascript bundling on the web and its security implications
J Rack, CA Staicu - Proceedings of the 2023 ACM SIGSAC Conference …, 2023 - dl.acm.org
In recent years, we have seen an increased interest in studying the software supply chain of
user-facing applications to uncover problematic third-party dependencies. Prior work shows …
user-facing applications to uncover problematic third-party dependencies. Prior work shows …
Automating seccomp filter generation for linux applications
Software vulnerabilities undermine the security of applications. By blocking unused
functionality, the impact of potential exploits can be reduced. While seccomp provides a …
functionality, the impact of potential exploits can be reduced. While seccomp provides a …