{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:16:32Z","timestamp":1755998192254,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":66,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,21]],"date-time":"2020-12-21T00:00:00Z","timestamp":1608508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Gift from Google"},{"name":"Gift from Microsoft Research"},{"name":"NSF grants","award":["CCF-1563991, 1917924"],"award-info":[{"award-number":["CCF-1563991, 1917924"]}]},{"name":"ONR contract","award":["N00014-17-1-2895"],"award-info":[{"award-number":["N00014-17-1-2895"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,21]]},"DOI":"10.1145\/3324884.3416644","type":"proceedings-article","created":{"date-parts":[[2021,1,27]],"date-time":"2021-01-27T23:38:56Z","timestamp":1611790736000},"page":"224-236","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Subdomain-based generality-aware debloating"],"prefix":"10.1145","author":[{"given":"Qi","family":"Xin","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology"}]},{"given":"Myeongsoo","family":"Kim","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology"}]},{"given":"Qirun","family":"Zhang","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology"}]},{"given":"Alessandro","family":"Orso","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology"}]}],"member":"320","published-online":{"date-parts":[[2021,1,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359823"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236064"},{"key":"e_1_3_2_1_3_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Azad Babak Amin","year":"2019","unstructured":"Babak Amin Azad, Pierre Laperdrix, and Nick Nikiforakis. 2019. Less is more: quantifying the security benefits of debloating web applications. In 28th USENIX Security Symposium (USENIX Security 19). 1697--1714."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509522"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594329"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455776"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/3016100.3016354"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00127"},{"key":"e_1_3_2_1_9_1","volume-title":"A measure of asymptotic efficiency for tests of a hypothesis based on the sum of observations. The Annals of Mathematical Statistics","author":"Chernoff Herman","year":"1952","unstructured":"Herman Chernoff. 1952. A measure of asymptotic efficiency for tests of a hypothesis based on the sum of observations. The Annals of Mathematical Statistics (1952), 493--507."},{"key":"e_1_3_2_1_10_1","volume-title":"https:\/\/github.com\/aspire-project\/chisel (accessed on","author":"Chisel Chisel","year":"2020","unstructured":"Chisel 2020. Chisel. https:\/\/github.com\/aspire-project\/chisel (accessed on September 2020)."},{"key":"e_1_3_2_1_11_1","volume-title":"https:\/\/github.com\/aspire-project\/chisel-bench (accessed on","author":"ChiselBench ChiselBench","year":"2020","unstructured":"ChiselBench 2020. ChiselBench. https:\/\/github.com\/aspire-project\/chisel-bench (accessed on September 2020)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SASO.2017.15"},{"key":"e_1_3_2_1_13_1","volume-title":"Clang: a C language family frontend for LLVM. https:\/\/clang.llvm.org\/ (accessed on","author":"Clang","year":"2020","unstructured":"Clang 2020. Clang: a C language family frontend for LLVM. https:\/\/clang.llvm.org\/ (accessed on September 2020)."},{"key":"e_1_3_2_1_14_1","volume-title":"Debop: Program Debloating via Stochastic Optimization. https:\/\/sites.google.com\/view\/debop19 (accessed on","author":"Debop","year":"2020","unstructured":"Debop 2020. Debop: Program Debloating via Stochastic Optimization. https:\/\/sites.google.com\/view\/debop19 (accessed on September 2020)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106249"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635899"},{"key":"e_1_3_2_1_17_1","volume-title":"Gibbs distributions, and the Bayesian restoration of images","author":"Geman Stuart","year":"1984","unstructured":"Stuart Geman and Donald Geman. 1984. Stochastic relaxation, Gibbs distributions, and the Bayesian restoration of images. IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI) (1984), 721--741."},{"volume-title":"Markov chain Monte Carlo in practice","author":"Gilks Walter R","key":"e_1_3_2_1_18_1","unstructured":"Walter R Gilks, Sylvia Richardson, and David Spiegelhalter. 1995. Markov chain Monte Carlo in practice. Chapman and Hall\/CRC."},{"key":"e_1_3_2_1_19_1","volume-title":"Conference on Artificial Intelligence (AAAI). 54--61","author":"Gomes Carla P","year":"2006","unstructured":"Carla P Gomes, Ashish Sabharwal, and Bart Selman. 2006. Model counting: A new strategy for obtaining good bounds. In Conference on Artificial Intelligence (AAAI). 54--61."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338956"},{"key":"e_1_3_2_1_21_1","volume-title":"Is Static Analysis Able to Identify Unnecessary Source Code? ACM Transactions on Software Engineering and Methodology (TOSEM)","author":"Haas Roman","year":"2020","unstructured":"Roman Haas, Rainer Niedermayr, Tobias Roehm, and Sven Apel. 2020. Is Static Analysis Able to Identify Unnecessary Source Code? ACM Transactions on Software Engineering and Methodology (TOSEM) (2020), 1--23."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243838"},{"volume-title":"The art of lean software development: a practical and incremental approach. \"O'Reilly Media","author":"Hibbs Curt","key":"e_1_3_2_1_23_1","unstructured":"Curt Hibbs, Steve Jewett, and Mike Sullivan. 2009. The art of lean software development: a practical and incremental approach. \"O'Reilly Media, Inc.\"."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/3155562.3155602"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03845-7_15"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2018.00029"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2016.146"},{"key":"e_1_3_2_1_28_1","unstructured":"Neil D Jones Carsten K Gomard and Peter Sestoft. 1993. Partial evaluation and automatic program generation. Peter Sestoft."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3301417.3312501"},{"volume-title":"Estimation of distribution algorithms: A new tool for evolutionary computation","author":"Larra\u00f1aga Pedro","key":"e_1_3_2_1_30_1","unstructured":"Pedro Larra\u00f1aga and Jose A Lozano. 2001. Estimation of distribution algorithms: A new tool for evolutionary computation. Kluwer Academic Publishers."},{"key":"e_1_3_2_1_31_1","volume-title":"Spending Moore's dividend. Commun. ACM","author":"Larus James R","year":"2009","unstructured":"James R Larus. 2009. Spending Moore's dividend. Commun. ACM (2009), 62--69."},{"key":"e_1_3_2_1_32_1","unstructured":"LattE 2020. LattE. https:\/\/www.math.ucdavis.edu\/~latte\/software.php"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2814270.2814319"},{"key":"e_1_3_2_1_34_1","volume-title":"GenProg: A generic method for automatic software repair","author":"Goues Claire Le","year":"2011","unstructured":"Claire Le Goues, ThanhVu Nguyen, Stephanie Forrest, and Westley Weimer. 2011. GenProg: A generic method for automatic software repair. IEEE Transactions on Software Engineering (TSE) (2011), 54--72."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/1939399.1939412"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.28"},{"key":"e_1_3_2_1_37_1","unstructured":"llvm-cov 2020. llvm-cov. https:\/\/llvm.org\/docs\/CommandGuide\/llvm-cov.html"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2695664.2695751"},{"volume-title":"Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI).","author":"Nori Aditya V","key":"e_1_3_2_1_39_1","unstructured":"Aditya V Nori, Sherjil Ozair, Sriram K Rajamani, and Deepak Vijaykeerthy. [n.d.]. Efficient synthesis of probabilistic programs. In Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI)."},{"key":"e_1_3_2_1_40_1","volume-title":"Genetic improvement of software: a comprehensive survey","author":"Petke Justyna","year":"2017","unstructured":"Justyna Petke, Saemundur O Haraldsson, Mark Harman, William B Langdon, David R White, and John R Woodward. 2017. Genetic improvement of software: a comprehensive survey. IEEE Transactions on Evolutionary Computation (TEVC) (2017), 415--432."},{"key":"e_1_3_2_1_41_1","volume-title":"Proceedings of the 28th USENIX Conference on Security Symposium (USENIX Security). 1733--1750","author":"Qian Chenxiong","year":"2019","unstructured":"Chenxiong Qian, Hong Hu, Mansour Alharthi, Pak Ho Chung, Taesoo Kim, and Wenke Lee. 2019. RAZOR: A Framework for Post-deployment Software Debloating. In Proceedings of the 28th USENIX Conference on Security Symposium (USENIX Security). 1733--1750."},{"key":"e_1_3_2_1_42_1","volume-title":"Proceedings of the 27th {USENIX} Security Symposium ({USENIX} Security). 869--886","author":"Quach Anh","year":"2018","unstructured":"Anh Quach, Aravind Prakash, and Lok Yan. 2018. Debloating software through piece-wise compilation and loading. In Proceedings of the 27th {USENIX} Security Symposium ({USENIX} Security). 869--886."},{"key":"e_1_3_2_1_43_1","volume-title":"Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv preprint arXiv:1511.06434","author":"Radford Alec","year":"2015","unstructured":"Alec Radford, Luke Metz, and Soumith Chintala. 2015. Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv preprint arXiv:1511.06434 (2015)."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106271"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254104"},{"key":"e_1_3_2_1_46_1","volume-title":"Stochastic backpropagation and approximate inference in deep generative models. arXiv preprint arXiv:1401.4082","author":"Rezende Danilo Jimenez","year":"2014","unstructured":"Danilo Jimenez Rezende, Shakir Mohamed, and Daan Wierstra. 2014. Stochastic backpropagation and approximate inference in deep generative models. arXiv preprint arXiv:1401.4082 (2014)."},{"volume-title":"Monte Carlo statistical methods","author":"Robert Christian","key":"e_1_3_2_1_47_1","unstructured":"Christian Robert and George Casella. 2013. Monte Carlo statistical methods. Springer Science & Business Media."},{"key":"e_1_3_2_1_48_1","unstructured":"ROPgadget 2020. ROPgadget. https:\/\/github.com\/JonathanSalwan\/ROPgadget"},{"key":"e_1_3_2_1_49_1","unstructured":"Sampler 2020. Detailed Description of the Sampler Programs. https:\/\/drive.google.com\/open?id=1D6-RurlAOu7RMpBxXEdGNV9pCtbu8Xuh"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594294"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491956.2462179"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451150"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541980"},{"volume-title":"ACM conference on Computer and communications security. ACM, 552--561","author":"Hovav","key":"e_1_3_2_1_54_1","unstructured":"Hovav Shacham et al. 2007. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86).. In ACM conference on Computer and communications security. ACM, 552--561."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238160"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106298"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180236"},{"key":"e_1_3_2_1_58_1","volume-title":"Sequential tests of statistical hypotheses. The annals of mathematical statistics","author":"Wald Abraham","year":"1945","unstructured":"Abraham Wald. 1945. Sequential tests of statistical hypotheses. The annals of mathematical statistics (1945), 117--186."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"crossref","unstructured":"Edward J Wegman. 1972. Nonparametric probability density estimation: I. A summary of available methods. Technometrics (1972) 533--546.","DOI":"10.1080\/00401706.1972.10488943"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010248"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377816.3381739"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542523"},{"key":"e_1_3_2_1_63_1","volume-title":"Scalable runtime bloat detection using abstract dynamic slicing. ACM Transactions on Software Engineering and Methodology (TOSEM)","author":"Xu Guoqing","year":"2014","unstructured":"Guoqing Xu, Nick Mitchell, Matthew Arnold, Atanas Rountev, Edith Schonberg, and Gary Sevitsky. 2014. Scalable runtime bloat detection using abstract dynamic slicing. ACM Transactions on Software Engineering and Methodology (TOSEM) (2014)."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882362.1882448"},{"key":"e_1_3_2_1_65_1","volume-title":"International Workshop on Verification, Model Checking, and Abstract Interpretation. Springer, 142--156","author":"Younes H\u00e5kan LS","year":"2006","unstructured":"H\u00e5kan LS Younes. 2006. Error control for probabilistic model checking. In International Workshop on Verification, Model Checking, and Abstract Interpretation. Springer, 142--156."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.988498"}],"event":{"name":"ASE '20: 35th IEEE\/ACM International Conference on Automated Software Engineering","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"location":"Virtual Event Australia","acronym":"ASE '20"},"container-title":["Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416644","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3324884.3416644","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:23Z","timestamp":1750193243000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416644"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,21]]},"references-count":66,"alternative-id":["10.1145\/3324884.3416644","10.1145\/3324884"],"URL":"https:\/\/doi.org\/10.1145\/3324884.3416644","relation":{},"subject":[],"published":{"date-parts":[[2020,12,21]]},"assertion":[{"value":"2021-01-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}