Proceedings of the 12th European Workshop on Systems Security 2019
DOI: 10.1145/3301417.3312501
|View full text |Cite
|
Sign up to set email alerts
|

Configuration-Driven Software Debloating

Abstract: With legitimate code becoming an attack surface due to the proliferation of code reuse attacks, software debloating is an effective mitigation that reduces the amount of instruction sequences that may be useful for an attacker, in addition to eliminating potentially exploitable bugs in the removed code. Existing debloating approaches either statically remove code that is guaranteed to not run (e.g., non-imported functions from shared libraries), or rely on profiling with realistic workloads to pinpoint and kee… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
20
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 46 publications
(22 citation statements)
references
References 13 publications
0
20
0
Order By: Relevance
“…Slimium [50] debloats Chromium features based on a static-, dynamic-, and heuristic-based analysis. Koo et al take a configuration-driven approach to remove feature-specific code [29], achieving 77% debloat on nginx. Trimmer [57] is another technique that takes as input a user configuration and uses it to drive the debloating process.…”
Section: Related Workmentioning
confidence: 99%
“…Slimium [50] debloats Chromium features based on a static-, dynamic-, and heuristic-based analysis. Koo et al take a configuration-driven approach to remove feature-specific code [29], achieving 77% debloat on nginx. Trimmer [57] is another technique that takes as input a user configuration and uses it to drive the debloating process.…”
Section: Related Workmentioning
confidence: 99%
“…In contrast, our study focuses on the evolution and the emergence of bloat in Java projects, while spotting some of the current research gaps and tooling for effective dependency management. Other studies have focused on eliminating bloat in source code [33], binary shared libraries [1], highly configurable programs [15], or containers [24]. Other works have focused on improving the debloat process through various optimizations techniques [2,3,11,31,35].…”
Section: Related Workmentioning
confidence: 99%
“…In the same vein, TRIMMER [81] specializes program code, and debloats applications, by leveraging user-defined configurations, while Shredder [61] further introduces constant propagation analyses to specialize system API functions. Last, Koo et al [48] propose the concept of configuration-based software debloating: i.e., the removal of featurespecific code, which is exclusively used only when certain configuration directives are specified/enabled. These approaches are orthogonal to Nibbler, looking at software thinning from a different perspective, while most of them (with the exception of Shredder) require access to source code.…”
Section: Related Work 71 Code Reductionmentioning
confidence: 99%