{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T05:40:26Z","timestamp":1756273226165,"version":"3.44.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,4]]},"DOI":"10.1109\/csr64739.2025.11129981","type":"proceedings-article","created":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:04:27Z","timestamp":1756235067000},"page":"260-266","source":"Crossref","is-referenced-by-count":0,"title":["MiniLib: A flow analysis\u2013based approach for attack surface reduction through software debloating"],"prefix":"10.1109","author":[{"given":"Loukas","family":"Kopanias","sequence":"first","affiliation":[{"name":"University of the Peloponnese,Department of Informatics and Telecommunications,Tripolis,Greece,22131"}]},{"given":"Panagiotis","family":"Sotiropoulos","sequence":"additional","affiliation":[{"name":"University of the Peloponnese,Department of Informatics and Telecommunications,Tripolis,Greece,22131"}]},{"given":"Nicholas","family":"Kolokotronis","sequence":"additional","affiliation":[{"name":"University of the Peloponnese,Department of Informatics and Telecommunications,Tripolis,Greece,22131"}]},{"given":"Costas","family":"Vassilakis","sequence":"additional","affiliation":[{"name":"University of the Peloponnese,Department of Informatics and Telecommunications,Tripolis,Greece,22131"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1088\/1749-4699\/6\/1\/015010"},{"volume-title":"Build a fat jar with maven","year":"2019","author":"Jenkov","key":"ref2"},{"key":"ref3","first-page":"375","volume-title":"Log4j Vulnerability","author":"Ferreira","year":"2023"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3524610.3527893"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1049\/ell2.13310"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ccwc54503.2022.9720884"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CSR57506.2023.10224931"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3554732"},{"volume-title":"Uses of class java.lang.processbuilder","year":"2023","key":"ref9"},{"key":"ref10","first-page":"941","article-title":"Enforcing forward-edge control-flow integrity in gcc & llvm","volume-title":"Proceedings of the 23rd USENIX Conference on Security Symposium, ser. SEC\u201914","author":"Tice"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102165"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3689937.3695792"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1882362.1882448"},{"article-title":"Razor: A framework for post-deployment software debloating","volume-title":"USENIX Security Symposium","author":"Qian","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22655-7_19"},{"volume-title":"Compiler and machine learning-based predictive techniques for security enhancement through software debloating","year":"2023","author":"Porter","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359823"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3414997"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2024.3446712"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2002.1173089"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2003.1235426"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409738"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243838"},{"key":"ref24","first-page":"869","article-title":"Debloating software through Piece-Wise compilation and loading","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Quach"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3546948"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3301417.3312501"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CCW.2003.1240790"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3556970"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3489449.3489972"},{"key":"ref30","first-page":"513","volume-title":"Visitor Pattern","author":"Sarcar","year":"2022"},{"key":"ref31","first-page":"21","volume-title":"Runtimes and Desktop Packs","author":"Vermeir","year":"2022"}],"event":{"name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2025,8,4]]},"location":"Chania, Crete, Greece","end":{"date-parts":[[2025,8,6]]}},"container-title":["2025 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11129696\/11129957\/11129981.pdf?arnumber=11129981","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T05:06:16Z","timestamp":1756271176000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11129981\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,4]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/csr64739.2025.11129981","relation":{},"subject":[],"published":{"date-parts":[[2025,8,4]]}}}