{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T14:48:15Z","timestamp":1776782895366,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,15]],"date-time":"2019-11-15T00:00:00Z","timestamp":1573776000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,15]]},"DOI":"10.1145\/3338502.3359764","type":"proceedings-article","created":{"date-parts":[[2019,11,8]],"date-time":"2019-11-08T13:40:33Z","timestamp":1573220433000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["CARVE"],"prefix":"10.1145","author":[{"given":"Michael D.","family":"Brown","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Santosh","family":"Pande","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2019,11,15]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3141235.3141242"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3273045.3273048"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243838"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238160"},{"key":"e_1_3_2_2_5_1","volume-title":"27th {USENIX} Security Symposium ({USENIX} Security 18)","author":"Quach Anh"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882362.1882448"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2039252.2039253"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2016.27"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2016.146"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3301417.3312501"},{"key":"e_1_3_2_2_11_1","unstructured":"The LLVM Compiler Infrastructure. https:\/\/llvm.org\/.  The LLVM Compiler Infrastructure. https:\/\/llvm.org\/."},{"key":"e_1_3_2_2_12_1","unstructured":"angr: A python framework for analyzing binaries. http:\/\/angr.io\/.  angr: A python framework for analyzing binaries. http:\/\/angr.io\/."},{"key":"e_1_3_2_2_13_1","unstructured":"BitBlaze. http:\/\/bitblaze.cs.berkeley.edu\/.  BitBlaze. http:\/\/bitblaze.cs.berkeley.edu\/."},{"key":"e_1_3_2_2_14_1","unstructured":"Aspire Project: ChiselBench. https:\/\/github.com\/aspire-project\/ChiselBench  Aspire Project: ChiselBench. https:\/\/github.com\/aspire-project\/ChiselBench"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966919"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-017-0299-1"},{"key":"e_1_3_2_2_18_1","volume-title":"Taesoo Kim, and Wenke Lee.","author":"Qian Chenxiong","year":"2019"},{"key":"e_1_3_2_2_19_1","unstructured":"CVE -- Common Vulnerabilities and Exposures. https:\/\/cve.mitre.org\/.  CVE -- Common Vulnerabilities and Exposures. https:\/\/cve.mitre.org\/."},{"key":"e_1_3_2_2_20_1","volume-title":"Proceedings of the 6th USENIX conference on Offensive Technologies (WOOT'12)","author":"Homescu Andrei","year":"2012"},{"key":"e_1_3_2_2_21_1","unstructured":"Dino Zovi. 2010. Practical return-oriented programming. SOURCE Boston. https:\/\/trailofbits.files.wordpress.com\/2010\/04\/practical-rop.pdf.  Dino Zovi. 2010. Practical return-oriented programming. SOURCE Boston. https:\/\/trailofbits.files.wordpress.com\/2010\/04\/practical-rop.pdf."},{"key":"e_1_3_2_2_22_1","volume-title":"Brown and Santosh Pande","author":"Michael","year":"2019"},{"key":"e_1_3_2_2_23_1","unstructured":"Jonathan Salwan. 2011. ROPgadget: Gadgets finder and auto-roper. http:\/\/shell-storm.org\/project\/ROPgadget\/.  Jonathan Salwan. 2011. ROPgadget: Gadgets finder and auto-roper. http:\/\/shell-storm.org\/project\/ROPgadget\/."},{"key":"e_1_3_2_2_24_1","unstructured":"Doxygen. http:\/\/www.doxygen.nl\/  Doxygen. http:\/\/www.doxygen.nl\/"},{"key":"e_1_3_2_2_25_1","unstructured":"Sphinx. http:\/\/www.sphinx-doc.org\/en\/master\/.  Sphinx. http:\/\/www.sphinx-doc.org\/en\/master\/."},{"key":"e_1_3_2_2_26_1","unstructured":"Coverity SAST. https:\/\/www.synopsys.com\/software-integiry\/security-testing\/static-analysis-sast.  Coverity SAST. https:\/\/www.synopsys.com\/software-integiry\/security-testing\/static-analysis-sast."}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","location":"London United Kingdom","acronym":"CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 3rd ACM Workshop on Forming an Ecosystem Around Software Transformation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338502.3359764","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3338502.3359764","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:12:49Z","timestamp":1750201969000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338502.3359764"}},"subtitle":["Practical Security-Focused Software Debloating Using Simple Feature Set Mappings"],"short-title":[],"issued":{"date-parts":[[2019,11,15]]},"references-count":26,"alternative-id":["10.1145\/3338502.3359764","10.1145\/3338502"],"URL":"https:\/\/doi.org\/10.1145\/3338502.3359764","relation":{},"subject":[],"published":{"date-parts":[[2019,11,15]]},"assertion":[{"value":"2019-11-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}