{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T12:52:52Z","timestamp":1756385572368,"version":"3.37.3"},"reference-count":30,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2023YFB4503905"],"award-info":[{"award-number":["2023YFB4503905"]}]},{"DOI":"10.13039\/501100002367","name":"HKUCAS Joint Laboratory for Intelligent System Software","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002367","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst."],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1109\/tcad.2024.3446712","type":"journal-article","created":{"date-parts":[[2024,11,6]],"date-time":"2024-11-06T18:40:50Z","timestamp":1730918450000},"page":"3768-3779","source":"Crossref","is-referenced-by-count":1,"title":["D-Linker: Debloating Shared Libraries by Relinking From Object Files"],"prefix":"10.1109","volume":"43","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-5570-719X","authenticated-orcid":false,"given":"Jiatai","family":"He","sequence":"first","affiliation":[{"name":"Institute of Software, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6480-2497","authenticated-orcid":false,"given":"Pengpeng","family":"Hou","sequence":"additional","affiliation":[{"name":"Institute of Software, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Jiageng","family":"Yu","sequence":"additional","affiliation":[{"name":"Institute of Software, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8548-116X","authenticated-orcid":false,"given":"Ji","family":"Qi","sequence":"additional","affiliation":[{"name":"Institute of Software, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1313-9530","authenticated-orcid":false,"given":"Ying","family":"Sun","sequence":"additional","affiliation":[{"name":"Institute of Software, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Lijuan","family":"Li","sequence":"additional","affiliation":[{"name":"Institute of Software, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-2701-2989","authenticated-orcid":false,"given":"Ruilin","family":"Zhao","sequence":"additional","affiliation":[{"name":"Institute of Software, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1823-0459","authenticated-orcid":false,"given":"Yanjun","family":"Wu","sequence":"additional","affiliation":[{"name":"Institute of Software, Chinese Academy of Sciences, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/2366.001.0001"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/360051.360076"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1017753.1017787"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1506409.1506425"},{"volume-title":"Shared library loading","year":"2022","key":"ref5"},{"key":"ref6","first-page":"869","article-title":"Debloating software through piece-wise compilation and loading","volume-title":"Proc. 27th USENIX Security Symp. (USENIX Security)","author":"Quach"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/277044.277185"},{"volume-title":"Alpine official image","year":"2022","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2006.26"},{"volume-title":"readahead(2)\u2014Linux manual page","year":"2022","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2133375.2133377"},{"volume-title":"BlueKeep vulnerability (CVE-2019-0708): National vulnerability database","year":"2019","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3358222"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3386017"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238160"},{"article-title":"LibFilter: Debloating dynamically-linked libraries through binary recompilation","year":"2019","author":"Shteinfeld","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359823"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3503222.3507768"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3301417.3312501"},{"volume-title":"Binary reduce","year":"2022","author":"Grammatech","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-022-10195-6"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387550"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3385972"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3445814.3446765"},{"volume-title":"Executable and linkable format","year":"2022","key":"ref25"},{"article-title":"Breaking payloads with runtime code stripping and image freezing","volume-title":"Proc. Black Hat USA","author":"Mulliner","key":"ref26"},{"volume-title":"Capstone: The ultimate disassembler","year":"2019","author":"Nguyen","key":"ref27"},{"key":"ref28","first-page":"215","article-title":"Ptrace, utrace, uprobes: Lightweight, dynamic tracing of user apps","volume-title":"Proc. Linux Symp.","author":"Keniston"},{"volume-title":"nm","year":"2022","key":"ref29"},{"volume-title":"Musl libc","year":"2022","key":"ref30"}],"container-title":["IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/43\/10745760\/10745870.pdf?arnumber=10745870","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T14:25:36Z","timestamp":1732717536000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10745870\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11]]},"references-count":30,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tcad.2024.3446712","relation":{},"ISSN":["0278-0070","1937-4151"],"issn-type":[{"type":"print","value":"0278-0070"},{"type":"electronic","value":"1937-4151"}],"subject":[],"published":{"date-parts":[[2024,11]]}}}