{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T06:36:49Z","timestamp":1757313409190,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030939557"},{"type":"electronic","value":"9783030939564"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-93956-4_8","type":"book-chapter","created":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T08:03:00Z","timestamp":1641974580000},"page":"128-143","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["JSLIM: Reducing the\u00a0Known Vulnerabilities of\u00a0JavaScript Application by\u00a0Debloating"],"prefix":"10.1007","author":[{"given":"Renjun","family":"Ye","sequence":"first","affiliation":[]},{"given":"Liang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Simin","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Fangzhou","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Jingxiu","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,12]]},"reference":[{"key":"8_CR1","unstructured":"Official babel documentation (2015). https:\/\/www.npmjs.com\/package\/detective"},{"key":"8_CR2","unstructured":"Agten, P., Joosen, W., Piessens, F., Nikiforakis, N.: Esprima. In: ECMAScript Parsing Infrastructure for Multipurpose Analysis (2012)"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Agten, P., Joosen, W., Piessens, F., Nikiforakis, N.: Seven months\u2019 worth of mistakes: a longitudinal study of typosquatting abuse. In: Network and Distributed System Security Symposium, 08\u201311 February 2015, San Diego, USA (2015)","DOI":"10.14722\/ndss.2015.23058"},{"key":"8_CR4","unstructured":"Azad, B.A., Laperdrix, P., Nikiforakis, N.: Less is more: quantifying the security benefits of debloating web applications. In: 28th USENIX Security Symposium USENIX Security 19, pp. 1697\u20131714 (2019)"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Brown, M.D., Pande, S.: Carve: practical security-focused software debloating using simple feature set mappings. In: Proceedings of the 3rd ACM Workshop on Forming an Ecosystem Around Software Transformation, pp. 1\u20137 (2019)","DOI":"10.1145\/3338502.3359764"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Bruce, B.R., Zhang, T., Arora, J., Xu, G.H., Kim, M.: Jshrink: in-depth investigation into debloating modern java applications. In: Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 135\u2013146 (2020)","DOI":"10.1145\/3368089.3409738"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Davis, J., Kildow, G., Lee, D.: The case of the poisoned event handler: weaknesses in the node.js event-driven architecture. In: Proceedings of the 10th European Workshop on Systems Security, p. 8 (2017)","DOI":"10.1145\/3065913.3065916"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Feldthaus, A., Sch\u00e4fer, M., Sridharan, M., Dolby, J., Tip, F.: Efficient construction of approximate call graphs for javascript IDE services. In: 2013 35th International Conference on Software Engineering (ICSE), pp. 752\u2013761. IEEE (2013)","DOI":"10.1109\/ICSE.2013.6606621"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Koo, H., Ghavamnia, S., Polychronakis, M.: Configuration-driven software debloating. In: Proceedings of the 12th European Workshop on Systems Security, pp. 1\u20136 (2019)","DOI":"10.1145\/3301417.3312501"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Landsborough, J., Harding, S., Fugate, S.: Removing the kitchen sink from software. In: Proceedings of the Companion Publication of the 2015 Annual Conference on Genetic and Evolutionary Computation, pp. 833\u2013838 (2015)","DOI":"10.1145\/2739482.2768424"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Macias, K., Mathur, M., Bruce, B.R., Zhang, T., Kim, M.: Webjshrink: a web service for debloating java bytecode. In: Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 1665\u20131669 (2020)","DOI":"10.1145\/3368089.3417934"},{"key":"8_CR12","unstructured":"node-elm. https:\/\/github.com\/bailicangdu\/node-elm"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Sharif, H., Abubakar, M., Gehani, A., Zaffar, F.: Trimmer: application specialization for code debloating. In: Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering, pp. 329\u2013339 (2018)","DOI":"10.1145\/3238147.3238160"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Shin, Y., Williams, L.: An empirical model to predict security vulnerabilities using code complexity metrics. In: Proceedings of the Second ACM-IEEE International Symposium on Empirical Software Engineering and Measurement, pp. 315\u2013317 (2008)","DOI":"10.1145\/1414004.1414065"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Sun, C., Li, Y., Zhang, Q., Gu, T., Su, Z.: Perses: syntax-guided program reduction. In: Proceedings of the 40th International Conference on Software Engineering, pp. 361\u2013371 (2018)","DOI":"10.1145\/3180155.3180236"},{"key":"8_CR16","unstructured":"Szurdi, J., Kocso, B., Cseh, G., Spring, J., Felegyhazi, M., Kanich, C.: The long \u201ctaile\u201d of typosquatting domain names. In: 23rd USENIX Security Symposium USENIX Security 14, pp. 191\u2013206 (2014)"},{"key":"8_CR17","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.infsof.2018.10.009","volume":"107","author":"HC V\u00e1zquez","year":"2019","unstructured":"V\u00e1zquez, H.C., Bergel, A., Vidal, S., Pace, J.D., Marcos, C.: Slimming javascript applications: an approach for removing unused functions from javascript libraries. Inf. Softw. Technol. 107, 18\u201329 (2019)","journal-title":"Inf. Softw. Technol."},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Xu, G., Arnold, M., Mitchell, N., Rountev, A., Sevitsky, G.: Go with the flow: profiling copies to find runtime bloat. In: Proceedings of the 30th ACM SIGPLAN Conference on Programming Language Design and Implementation, pp. 419\u2013430 (2009)","DOI":"10.1145\/1543135.1542523"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Xu, G., Mitchell, N., Arnold, M., Rountev, A., Sevitsky, G.: Software bloat analysis: finding, removing, and preventing performance problems in modern large-scale object-oriented applications. In: Proceedings of the FSE\/SDP Workshop on Future of Software Engineering Research, pp. 421\u2013426 (2010)","DOI":"10.1145\/1882362.1882448"},{"key":"8_CR20","unstructured":"Zimmermann, M., Staicu, C.A., Tenny, C., Pradel, M.: Small world with high risks: a study of security threats in the NPM ecosystem. In: 28th USENIX Security Symposium USENIX Security 19, pp. 995\u20131010 (2019)"}],"container-title":["Communications in Computer and Information Science","Emerging Information Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-93956-4_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T04:29:48Z","timestamp":1651811388000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-93956-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030939557","9783030939564"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-93956-4_8","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"12 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EISA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Emerging Information Security and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 November 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 November 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eisa2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eisa.compute.dtu.dk\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the COVID-19 pandemic the conference was held online.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}