{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T15:14:40Z","timestamp":1759936480429,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,1,5]],"date-time":"2024-01-05T00:00:00Z","timestamp":1704412800000},"content-version":"vor","delay-in-days":452,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N68335-17-C-0558"],"award-info":[{"award-number":["N68335-17-C-0558"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["ACI-1440800"],"award-info":[{"award-number":["ACI-1440800"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,10]]},"DOI":"10.1145\/3551349.3559529","type":"proceedings-article","created":{"date-parts":[[2023,1,5]],"date-time":"2023-01-05T20:43:54Z","timestamp":1672951434000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Trimmer: Context-Specific Code Reduction"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7479-7567","authenticated-orcid":false,"given":"Aatira Anum","family":"Ahmad","sequence":"first","affiliation":[{"name":"Lahore University of Management Sciences, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1328-1916","authenticated-orcid":false,"given":"Mubashir","family":"Anwar","sequence":"additional","affiliation":[{"name":"University of Illinois Urbana-Champaign, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9496-9028","authenticated-orcid":false,"given":"Hashim","family":"Sharif","sequence":"additional","affiliation":[{"name":"University of Illinois Urbana-Champaign, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3940-2467","authenticated-orcid":false,"given":"Ashish","family":"Gehani","sequence":"additional","affiliation":[{"name":"SRI, United States of America"}]},{"given":"Fareed","family":"Zaffar","sequence":"additional","affiliation":[{"name":"Lahore University of Management Sciences, Pakistan"}]}],"member":"320","published-online":{"date-parts":[[2023,1,5]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Large-Scale Debloating of Binary Shared Libraries. Digital Threats 1, 4","author":"Agadakos Ioannis","year":"2020","unstructured":"Ioannis Agadakos, Nicholas Demarinis, Di Jin, Kent Williams-King, Jearson Alfajardo, Benjamin Shteinfeld, David Williams-King, Vasileios\u00a0P. Kemerlis, and Georgios Portokalidis. 2020. Large-Scale Debloating of Binary Shared Libraries. Digital Threats 1, 4 (2020)."},{"key":"e_1_3_2_1_2_1","volume-title":"TRIMMER: An Automated System for Configuration-based Software Debloating","author":"Ahmad Aatira\u00a0Anum","year":"2021","unstructured":"Aatira\u00a0Anum Ahmad, Abdul\u00a0Rafae Noor, Hashim Sharif, Usama Hameed, Shoaib Asif, Mubashir Anwar, Ashish Gehani, Junaid\u00a0Haroon Siddiqui, and Fareed\u00a0M Zaffar. 2021. TRIMMER: An Automated System for Configuration-based Software Debloating. IEEE Transactions on Software Engineering(2021)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3422337.3447844"},{"key":"e_1_3_2_1_4_1","volume-title":"12th USENIX Workshop on Cyber Security Experimentation and Test.","author":"Brown D","year":"2019","unstructured":"Michael\u00a0D Brown and Santosh Pande. 2019. Is less really more? Towards better metrics for measuring security improvements realized through software debloating. In 12th USENIX Workshop on Cyber Security Experimentation and Test."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Bobby\u00a0R. Bruce Tianyi Zhang Jaspreet Arora Guoqing\u00a0Harry Xu and Miryung Kim. 2020. JShrink: In-Depth Investigation into Debloating Modern Java Applications. ACM.","DOI":"10.1145\/3368089.3409738"},{"key":"e_1_3_2_1_6_1","unstructured":"GNU. 2020. GNU wget. \"https:\/\/www.gnu.org\/software\/wget\/\"."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243838"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3273045.3273050"},{"key":"e_1_3_2_1_9_1","volume-title":"20th Network and Distributed System Security Symposium.","author":"Kurmus Anil","year":"2013","unstructured":"Anil Kurmus, Reinhard Tartler, Daniela Dorneanu, Bernhard Heinloth, Valentin Rothberg, Andreas Ruprecht, Wolfgang Schr\u00f6der-Preikschat, Daniel Lohmann, and R\u00fcdiger Kapitza. 2013. Attack surface metrics and automated compile-time OS kernel tailoring. In 20th Network and Distributed System Security Symposium."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2695664.2695751"},{"key":"e_1_3_2_1_11_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Qian Chenxiong","year":"2019","unstructured":"Chenxiong Qian, Hong Hu, Mansour Alharthi, Pak\u00a0Ho Chung, Taesoo Kim, and Wenke Lee. 2019. RAZOR: A framework for post-deployment software debloating. In 28th USENIX Security Symposium (USENIX Security 19). 1733\u20131750."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/3277203.3277269"},{"key":"e_1_3_2_1_13_1","volume-title":"13th Workshop on Hot Topics in Operating Systems.","author":"Smowton Christopher","year":"2011","unstructured":"Christopher Smowton. 2011. Make world. In 13th Workshop on Hot Topics in Operating Systems."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2892208.2892235"}],"event":{"name":"ASE '22: 37th IEEE\/ACM International Conference on Automated Software Engineering","acronym":"ASE '22","location":"Rochester MI USA"},"container-title":["Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3551349.3559529","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3551349.3559529","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3551349.3559529","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T08:31:29Z","timestamp":1755851489000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3551349.3559529"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,10]]},"references-count":14,"alternative-id":["10.1145\/3551349.3559529","10.1145\/3551349"],"URL":"https:\/\/doi.org\/10.1145\/3551349.3559529","relation":{},"subject":[],"published":{"date-parts":[[2022,10,10]]},"assertion":[{"value":"2023-01-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}