{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:03:52Z","timestamp":1775912632025,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,8,21]],"date-time":"2017-08-21T00:00:00Z","timestamp":1503273600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Defence Advanced Research Agency","award":["FA8650-15-C-756"],"award-info":[{"award-number":["FA8650-15-C-756"]}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1564105, CNS-1228700, CNS-1565321, CNS-1228620"],"award-info":[{"award-number":["CNS-1564105, CNS-1228700, CNS-1565321, CNS-1228620"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,8,21]]},"DOI":"10.1145\/3106237.3106271","type":"proceedings-article","created":{"date-parts":[[2017,8,2]],"date-time":"2017-08-02T19:36:18Z","timestamp":1501702578000},"page":"476-486","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":68,"title":["Cimplifier: automatically debloating containers"],"prefix":"10.1145","author":[{"given":"Vaibhav","family":"Rastogi","sequence":"first","affiliation":[{"name":"University of Wisconsin-Madison, USA"}]},{"given":"Drew","family":"Davidson","sequence":"additional","affiliation":[{"name":"Tala Security, USA"}]},{"given":"Lorenzo","family":"De Carli","sequence":"additional","affiliation":[{"name":"Colorado State University, USA"}]},{"given":"Somesh","family":"Jha","sequence":"additional","affiliation":[{"name":"University of Wisconsin-Madison, USA \/ Tala Security, USA"}]},{"given":"Patrick","family":"McDaniel","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,8,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Selenium IDE. Tool Documentation. http:\/\/www.seleniumhq.org\/docs\/02_ selenium_ide.jsp.  Selenium IDE. Tool Documentation. http:\/\/www.seleniumhq.org\/docs\/02_ selenium_ide.jsp."},{"key":"e_1_3_2_1_2_1","unstructured":"BIGOT J.-T. L. April 2015. http:\/\/blog.yadutaf.fr\/2015\/04\/25\/ how-i-shrunk-a-docker-image-by-98-8-featuring-fanotify\/.  BIGOT J.-T. L. April 2015. http:\/\/blog.yadutaf.fr\/2015\/04\/25\/ how-i-shrunk-a-docker-image-by-98-8-featuring-fanotify\/."},{"key":"e_1_3_2_1_3_1","first-page":"322","volume-title":"NSDI","author":"Bittau A.","year":"2008","unstructured":"Bittau , A. , Marchenko , P. , Handley , M. , and Karp , B . Wedge: Splitting applications into reduced-privilege compartments . In NSDI ( 2008 ), pp. 309\u2013 322 . Bittau, A., Marchenko, P., Handley, M., and Karp, B. Wedge: Splitting applications into reduced-privilege compartments. In NSDI (2008), pp. 309\u2013322."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.16"},{"key":"e_1_3_2_1_5_1","first-page":"72","volume-title":"USENIX Security Symposium","author":"Brumley D.","year":"2004","unstructured":"Brumley , D. , and Song , D . Privtrans: Automatically partitioning programs for privilege separation . In USENIX Security Symposium ( 2004 ), pp. 57\u2013 72 . Brumley, D., and Song, D. Privtrans: Automatically partitioning programs for privilege separation. In USENIX Security Symposium (2004), pp. 57\u201372."},{"key":"e_1_3_2_1_6_1","unstructured":"Docker and btrfs in practice. Docker documentation. https:\/\/docs.docker.com\/ engine\/userguide\/storagedriver\/btrfs-driver\/.  Docker and btrfs in practice. Docker documentation. https:\/\/docs.docker.com\/ engine\/userguide\/storagedriver\/btrfs-driver\/."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.14778\/2350229.2350262"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1461928.1461949"},{"key":"e_1_3_2_1_9_1","first-page":"286","volume-title":"Proceedings of the 2nd conference on Symposium on Networked Systems Design &amp; Implementation-Volume 2","author":"Clark C.","year":"2005","unstructured":"Clark , C. , Fraser , K. , Hand , S. , Hansen , J. G. , Jul , E. , Limpach , C. , Pratt , I. , and Warfield , A . Live migration of virtual machines . In Proceedings of the 2nd conference on Symposium on Networked Systems Design &amp; Implementation-Volume 2 ( 2005 ), USENIX Association , pp. 273\u2013 286 . Clark, C., Fraser, K., Hand, S., Hansen, J. G., Jul, E., Limpach, C., Pratt, I., and Warfield, A. Live migration of virtual machines. In Proceedings of the 2nd conference on Symposium on Networked Systems Design &amp; Implementation-Volume 2 (2005), USENIX Association, pp. 273\u2013286."},{"key":"e_1_3_2_1_10_1","volume-title":"Web Article","year":"2015","unstructured":"8 surprising facts about real docker adoption . Web Article , October 2015 . https: \/\/www.datadoghq.com\/docker-adoption\/. 8 surprising facts about real docker adoption. Web Article, October 2015. https: \/\/www.datadoghq.com\/docker-adoption\/."},{"key":"e_1_3_2_1_11_1","volume-title":"Optimizing docker images","author":"deHamer B.","year":"2014","unstructured":"deHamer , B. Optimizing docker images . CenturyLink Developer Center Blog , July 2014 . https:\/\/www.ctl.io\/developers\/blog\/post\/optimizing-docker-images\/. deHamer, B. Optimizing docker images. CenturyLink Developer Center Blog, July 2014. https:\/\/www.ctl.io\/developers\/blog\/post\/optimizing-docker-images\/."},{"key":"e_1_3_2_1_12_1","unstructured":"Docker. Website. https:\/\/www.docker.com\/.  Docker. Website. https:\/\/www.docker.com\/."},{"key":"e_1_3_2_1_13_1","unstructured":"Understand images containers and storage drivers. Docker documentation. https: \/\/docs.docker.com\/engine\/userguide\/storagedriver\/imagesandcontainers\/.  Understand images containers and storage drivers. Docker documentation. https: \/\/docs.docker.com\/engine\/userguide\/storagedriver\/imagesandcontainers\/."},{"key":"e_1_3_2_1_14_1","unstructured":"Docker security. Docker documentation. https:\/\/docs.docker.com\/engine\/ security\/security\/.  Docker security. Docker documentation. https:\/\/docs.docker.com\/engine\/ security\/security\/."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380210802"},{"key":"e_1_3_2_1_16_1","volume-title":"Blog","author":"Dowideit S.","year":"2015","unstructured":"Dowideit , S. Slim application containers (using docker) . Blog , April 2015 . http:\/\/fosiki.com\/blog\/2015\/04\/28\/slim-application-containers-using-docker\/. Dowideit, S. Slim application containers (using docker). Blog, April 2015. http:\/\/fosiki.com\/blog\/2015\/04\/28\/slim-application-containers-using-docker\/."},{"key":"e_1_3_2_1_17_1","unstructured":"The elastic stack | make sense of your data. Website. https:\/\/www.elastic.co\/ products.  The elastic stack | make sense of your data. Website. https:\/\/www.elastic.co\/ products."},{"key":"e_1_3_2_1_18_1","unstructured":"The 2016 workshop on forming an ecosystem around software transformation (feast) October 2016. https:\/\/sites.google.com\/site\/ccsfeast16\/.  The 2016 workshop on forming an ecosystem around software transformation (feast) October 2016. https:\/\/sites.google.com\/site\/ccsfeast16\/."},{"key":"e_1_3_2_1_19_1","volume-title":"USENIX Annual Technical Conference","author":"Guo P. J.","year":"2011","unstructured":"Guo , P. J. , and Engler , D. R . Cde: Using system call interposition to automatically create portable software packages . In USENIX Annual Technical Conference ( 2011 ). Guo, P. J., and Engler, D. R. Cde: Using system call interposition to automatically create portable software packages. In USENIX Annual Technical Conference (2011)."},{"key":"e_1_3_2_1_20_1","unstructured":"Haproxy \u2013 the reliable high performance tcp\/http load balancer. Website. http: \/\/www.haproxy.org\/.  Haproxy \u2013 the reliable high performance tcp\/http load balancer. Website. http: \/\/www.haproxy.org\/."},{"key":"e_1_3_2_1_21_1","volume-title":"HotOS","author":"Krohn M. N.","year":"2005","unstructured":"Krohn , M. N. , Efstathopoulos , P. , Frey , C. , Kaashoek , M. F. , Kohler , E. , Mazieres , D. , Morris , R. , Osborne , M. , VanDeBogart , S. , and Ziegler , D . Make least privilege a right (not a privilege) . In HotOS ( 2005 ). Krohn, M. N., Efstathopoulos, P., Frey, C., Kaashoek, M. F., Kohler, E., Mazieres, D., Morris, R., Osborne, M., VanDeBogart, S., and Ziegler, D. Make least privilege a right (not a privilege). In HotOS (2005)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Kumar A. May 2015.  Kumar A. May 2015.","DOI":"10.1016\/S0958-2118(15)30223-8"},{"key":"e_1_3_2_1_23_1","unstructured":"https:\/\/medium.com\/@aneeshep\/ working-with-dockers-64c8bc4b5f92#.f3i10qkyt.  https:\/\/medium.com\/@aneeshep\/ working-with-dockers-64c8bc4b5f92#.f3i10qkyt."},{"key":"e_1_3_2_1_24_1","unstructured":"Linux containers. Website. https:\/\/linuxcontainers.org\/.  Linux containers. Website. https:\/\/linuxcontainers.org\/."},{"key":"e_1_3_2_1_25_1","unstructured":"MediaWiki. Website. https:\/\/www.mediawiki.org\/wiki\/MediaWiki.  MediaWiki. Website. https:\/\/www.mediawiki.org\/wiki\/MediaWiki."},{"key":"e_1_3_2_1_26_1","unstructured":"MongoDB. Website. https:\/\/www.mongodb.org\/.  MongoDB. Website. https:\/\/www.mongodb.org\/."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/292540.292561"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/268998.266669"},{"key":"e_1_3_2_1_29_1","unstructured":"Nginx. Website. http:\/\/nginx.org\/en\/.  Nginx. Website. http:\/\/nginx.org\/en\/."},{"key":"e_1_3_2_1_30_1","unstructured":"Oracle. https:\/\/github.com\/oracle\/crashcart.  Oracle. https:\/\/github.com\/oracle\/crashcart."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/844128.844162"},{"key":"e_1_3_2_1_32_1","unstructured":"Parasoft c\/c++test. https:\/\/www.parasoft.com\/product\/cpptest\/.  Parasoft c\/c++test. https:\/\/www.parasoft.com\/product\/cpptest\/."},{"key":"e_1_3_2_1_33_1","volume-title":"USENIX Security","volume":"3","author":"Provos N.","year":"2003","unstructured":"Provos , N. , Friedl , M. , and Honeyman , P . Preventing privilege escalation . In USENIX Security ( 2003 ), vol. 3 . Provos, N., Friedl, M., and Honeyman, P. Preventing privilege escalation. In USENIX Security (2003), vol. 3."},{"key":"e_1_3_2_1_34_1","unstructured":"Quest K. C. https:\/\/github.com\/cloudimmunity\/docker-slim.  Quest K. C. https:\/\/github.com\/cloudimmunity\/docker-slim."},{"key":"e_1_3_2_1_35_1","unstructured":"Redis. Website. http:\/\/redis.io\/.  Redis. Website. http:\/\/redis.io\/."},{"key":"e_1_3_2_1_36_1","unstructured":"Docker registry. Website. https:\/\/docs.docker.com\/registry\/.  Docker registry. Website. https:\/\/docs.docker.com\/registry\/."},{"key":"e_1_3_2_1_37_1","unstructured":"Linux audit. Website. https:\/\/people.redhat.com\/sgrubb\/audit\/.  Linux audit. Website. https:\/\/people.redhat.com\/sgrubb\/audit\/."},{"key":"e_1_3_2_1_38_1","unstructured":"Docker adoption doubles in a year February 2016. http: \/\/www.datacenterdynamics.com\/content-tracks\/servers-storage\/ docker-adoption-doubles-in-a-year\/95703.fullarticle.  Docker adoption doubles in a year February 2016. http: \/\/www.datacenterdynamics.com\/content-tracks\/servers-storage\/ docker-adoption-doubles-in-a-year\/95703.fullarticle."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9939"},{"key":"e_1_3_2_1_40_1","unstructured":"Swamp: Software assurance marketplace. https:\/\/continuousassurance.org\/.  Swamp: Software assurance marketplace. https:\/\/continuousassurance.org\/."},{"key":"e_1_3_2_1_41_1","volume-title":"June","author":"van Holsteijn M.","year":"2015","unstructured":"van Holsteijn , M. How to create the smallest possible docker container of any image. Xebia blog , June 2015 . http:\/\/blog.xebia.com\/ how-to-create-the-smallest-possible-docker-container-of-any-image\/. van Holsteijn, M. How to create the smallest possible docker container of any image. Xebia blog, June 2015. http:\/\/blog.xebia.com\/ how-to-create-the-smallest-possible-docker-container-of-any-image\/."},{"key":"e_1_3_2_1_42_1","unstructured":"WordPress.org. Website. https:\/\/wordpress.org\/.  WordPress.org. Website. https:\/\/wordpress.org\/."}],"event":{"name":"ESEC\/FSE'17: Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering","location":"Paderborn Germany","acronym":"ESEC\/FSE'17","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3106237.3106271","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3106237.3106271","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3106237.3106271","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:37Z","timestamp":1750217437000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3106237.3106271"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,21]]},"references-count":42,"alternative-id":["10.1145\/3106237.3106271","10.1145\/3106237"],"URL":"https:\/\/doi.org\/10.1145\/3106237.3106271","relation":{},"subject":[],"published":{"date-parts":[[2017,8,21]]},"assertion":[{"value":"2017-08-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}