{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:25:43Z","timestamp":1759335943854,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T00:00:00Z","timestamp":1688947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Office of Naval Research (ONR)","award":["N00014-17-1-2788, N00014- 22-1-2643, N00014-17-1-2787"],"award-info":[{"award-number":["N00014-17-1-2788, N00014- 22-1-2643, N00014-17-1-2787"]}]},{"name":"National Science Foundation (NSF)","award":["CNS-2213727"],"award-info":[{"award-number":["CNS-2213727"]}]},{"name":"DARPA","award":["D21AP10116-00"],"award-info":[{"award-number":["D21AP10116-00"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,10]]},"DOI":"10.1145\/3579856.3595796","type":"proceedings-article","created":{"date-parts":[[2023,7,5]],"date-time":"2023-07-05T14:52:13Z","timestamp":1688568733000},"page":"259-273","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Eliminating Vulnerabilities by Disabling Unwanted Functionality in Binary Programs"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4281-1683","authenticated-orcid":false,"given":"Mohamad","family":"Mansouri","sequence":"first","affiliation":[{"name":"EURECOM, France"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-8128-5062","authenticated-orcid":false,"given":"Jun","family":"Xu","sequence":"additional","affiliation":[{"name":"University of Utah, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1665-803X","authenticated-orcid":false,"given":"Georgios","family":"Portokalidis","sequence":"additional","affiliation":[{"name":"Stevens Institute of Technology, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2023,7,10]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the Annual Computer Security Applications Conference (ACSAC)","author":"Agadakos Ioannis","year":"2019","unstructured":"Ioannis Agadakos , Di Jin , David Williams-King , Vasileios\u00a0 P. Kemerlis , and Georgios Portokalidis . 2019 . Nibbler: Debloating Binary Shared Libraries . In Proceedings of the Annual Computer Security Applications Conference (ACSAC) ( San Juan, Puerto Rico). ACM, USA, 70\u201383. Ioannis Agadakos, Di Jin, David Williams-King, Vasileios\u00a0P. Kemerlis, and Georgios Portokalidis. 2019. Nibbler: Debloating Binary Shared Libraries. In Proceedings of the Annual Computer Security Applications Conference (ACSAC) (San Juan, Puerto Rico). ACM, USA, 70\u201383."},{"volume-title":"Design and Implementation for Checkpointing of Distributed Resources Using Process-Level Virtualization. In International Conference on Cluster Computing (CLUSTER). IEEE, USA, 402\u2013412","author":"Arya K.","key":"e_1_3_2_1_2_1","unstructured":"K. Arya , R. Garg , A.\u00a0 Y. Polyakov , and G. Cooperman . 2016 . Design and Implementation for Checkpointing of Distributed Resources Using Process-Level Virtualization. In International Conference on Cluster Computing (CLUSTER). IEEE, USA, 402\u2013412 . K. Arya, R. Garg, A.\u00a0Y. Polyakov, and G. Cooperman. 2016. Design and Implementation for Checkpointing of Distributed Resources Using Process-Level Virtualization. In International Conference on Cluster Computing (CLUSTER). IEEE, USA, 402\u2013412."},{"key":"e_1_3_2_1_3_1","unstructured":"Raj Chandel. 2019. Linux for Pentester : ZIP Privilege Escalation. https:\/\/www.hackingarticles.in\/linux-for-pentester-zip-privilege-escalation\/.  Raj Chandel. 2019. Linux for Pentester : ZIP Privilege Escalation. https:\/\/www.hackingarticles.in\/linux-for-pentester-zip-privilege-escalation\/."},{"volume-title":"Proceedings of the Workshop on Forming an Ecosystem Around Software Transformation (FEAST). ACM, 23\u201329","author":"Chen Y.","key":"e_1_3_2_1_4_1","unstructured":"Y. Chen , T. Lan , and G. Venkataramani . 2017. DamGate: Dynamic Adaptive Multi-feature Gating in Program Binaries . In Proceedings of the Workshop on Forming an Ecosystem Around Software Transformation (FEAST). ACM, 23\u201329 . Y. Chen, T. Lan, and G. Venkataramani. 2017. DamGate: Dynamic Adaptive Multi-feature Gating in Program Binaries. In Proceedings of the Workshop on Forming an Ecosystem Around Software Transformation (FEAST). ACM, 23\u201329."},{"volume-title":"Proceedings of the Workshop on Forming an Ecosystem Around Software Transformation (FEAST). ACM, 1\u20137.","author":"Chen Y.","key":"e_1_3_2_1_5_1","unstructured":"Y. Chen , S. Sun , T. Lan , and G. Venkataramani . 2018. TOSS: Tailoring Online Server Systems Through Binary Feature Customization . In Proceedings of the Workshop on Forming an Ecosystem Around Software Transformation (FEAST). ACM, 1\u20137. Y. Chen, S. Sun, T. Lan, and G. Venkataramani. 2018. TOSS: Tailoring Online Server Systems Through Binary Feature Customization. In Proceedings of the Workshop on Forming an Ecosystem Around Software Transformation (FEAST). ACM, 1\u20137."},{"volume-title":"2017 IEEE 11th International Conference on Self-Adaptive and Self-Organizing Systems (SASO). 61\u201370","author":"Christi A.","key":"e_1_3_2_1_6_1","unstructured":"A. Christi , A. Groce , and R. Gopinath . 2017. Resource Adaptation via Test-Based Software Minimization . In 2017 IEEE 11th International Conference on Self-Adaptive and Self-Organizing Systems (SASO). 61\u201370 . A. Christi, A. Groce, and R. Gopinath. 2017. Resource Adaptation via Test-Based Software Minimization. In 2017 IEEE 11th International Conference on Self-Adaptive and Self-Organizing Systems (SASO). 61\u201370."},{"volume-title":"IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW). 73\u201378","author":"Christi A.","key":"e_1_3_2_1_7_1","unstructured":"A. Christi , A. Groce , and A. Wellman . 2019. Building Resource Adaptations via Test-Based Software Minimization: Application, Challenges, and Opportunities . In IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW). 73\u201378 . A. Christi, A. Groce, and A. Wellman. 2019. Building Resource Adaptations via Test-Based Software Minimization: Application, Challenges, and Opportunities. In IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW). 73\u201378."},{"key":"e_1_3_2_1_8_1","volume-title":"WRK: Modern HTTP benchmarking tool. https:\/\/github.com\/wg\/wrk.","author":"Glozer Will","year":"2019","unstructured":"Will Glozer . 2019 . WRK: Modern HTTP benchmarking tool. https:\/\/github.com\/wg\/wrk. Will Glozer. 2019. WRK: Modern HTTP benchmarking tool. https:\/\/github.com\/wg\/wrk."},{"key":"e_1_3_2_1_9_1","volume-title":"Journal of Physics: Conference Series (sep","author":"Hargrove H.","year":"2006","unstructured":"P.\u00a0 H. Hargrove and J.\u00a0 C. Duell . 2006 . Berkeley lab checkpoint\/restart (BLCR) for Linux clusters . Journal of Physics: Conference Series (sep 2006), 494\u2013499. P.\u00a0H. Hargrove and J.\u00a0C. Duell. 2006. Berkeley lab checkpoint\/restart (BLCR) for Linux clusters. Journal of Physics: Conference Series (sep 2006), 494\u2013499."},{"volume-title":"Proceedings of the Conference on Computer and Communications Security (CCS). ACM, 380\u2013394","author":"Heo K.","key":"e_1_3_2_1_10_1","unstructured":"K. Heo , W. Lee , P. Pashakhanloo , and M. Naik . 2018. Effective Program Debloating via Reinforcement Learning . In Proceedings of the Conference on Computer and Communications Security (CCS). ACM, 380\u2013394 . K. Heo, W. Lee, P. Pashakhanloo, and M. Naik. 2018. Effective Program Debloating via Reinforcement Learning. In Proceedings of the Conference on Computer and Communications Security (CCS). ACM, 380\u2013394."},{"key":"e_1_3_2_1_11_1","unstructured":"Hex-Rays. 2020. The IDA Pro Disassembler and Debugger. https:\/\/www.hex-rays.com\/products\/ida\/.  Hex-Rays. 2020. The IDA Pro Disassembler and Debugger. https:\/\/www.hex-rays.com\/products\/ida\/."},{"volume-title":"Talos: Neutralizing Vulnerabilities with Security Workarounds for Rapid Response. In Symposium on Security and Privacy (SP). IEEE, 618\u2013635","author":"Huang Z.","key":"e_1_3_2_1_12_1","unstructured":"Z. Huang , M. D Angelo , D. Miyani , and D. Lie . 2016 . Talos: Neutralizing Vulnerabilities with Security Workarounds for Rapid Response. In Symposium on Security and Privacy (SP). IEEE, 618\u2013635 . Z. Huang, M. DAngelo, D. Miyani, and D. Lie. 2016. Talos: Neutralizing Vulnerabilities with Security Workarounds for Rapid Response. In Symposium on Security and Privacy (SP). IEEE, 618\u2013635."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568271"},{"volume-title":"Proceedings of the Annual Computer Software and Applications Conference (COMPSAC). IEEE, USA, 12\u201321","author":"Jiang Y.","key":"e_1_3_2_1_14_1","unstructured":"Y. Jiang , D. Wu , and P. Liu . 2016. JRed: Program Customization and Bloatware Mitigation Based on Static Analysis . In Proceedings of the Annual Computer Software and Applications Conference (COMPSAC). IEEE, USA, 12\u201321 . Y. Jiang, D. Wu, and P. Liu. 2016. JRed: Program Customization and Bloatware Mitigation Based on Static Analysis. In Proceedings of the Annual Computer Software and Applications Conference (COMPSAC). IEEE, USA, 12\u201321."},{"volume-title":"Proceedings of the International Symposium on High Assurance Systems Engineering (HASE). ACM, 122\u2013131","author":"Jiang Y.","key":"e_1_3_2_1_15_1","unstructured":"Y. Jiang , C. Zhang , D. Wu , and P. Liu . 2016. Feature-Based Software Customization: Preliminary Analysis, Formalization, and Methods . In Proceedings of the International Symposium on High Assurance Systems Engineering (HASE). ACM, 122\u2013131 . Y. Jiang, C. Zhang, D. Wu, and P. Liu. 2016. Feature-Based Software Customization: Preliminary Analysis, Formalization, and Methods. In Proceedings of the International Symposium on High Assurance Systems Engineering (HASE). ACM, 122\u2013131."},{"volume-title":"Metrics and Models in Software Quality Engineering","author":"Kan H.","key":"e_1_3_2_1_16_1","unstructured":"S.\u00a0 H. Kan . 2002. Metrics and Models in Software Quality Engineering . Addison-Wesley Professional . S.\u00a0H. Kan. 2002. Metrics and Models in Software Quality Engineering. Addison-Wesley Professional."},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the ACM SIGPLAN\/SIGOPS International Conference on Virtual Execution Environments (VEE)","author":"Kemerlis P.","year":"2012","unstructured":"Vasileios\u00a0 P. Kemerlis , Georgios Portokalidis , Kangkook Jee , and Angelos\u00a0 D. Keromytis . 2012 . libdft: Practical Dynamic Data Flow Tracking for Commodity Systems . In Proceedings of the ACM SIGPLAN\/SIGOPS International Conference on Virtual Execution Environments (VEE) ( London, UK). 121\u2013132. Vasileios\u00a0P. Kemerlis, Georgios Portokalidis, Kangkook Jee, and Angelos\u00a0D. Keromytis. 2012. libdft: Practical Dynamic Data Flow Tracking for Commodity Systems. In Proceedings of the ACM SIGPLAN\/SIGOPS International Conference on Virtual Execution Environments (VEE) (London, UK). 121\u2013132."},{"key":"e_1_3_2_1_18_1","first-page":"1","article-title":"Configuration-Driven Software Debloating. In Proceedings of the European Workshop on Systems Security (EUROSEC)","volume":"9","author":"Koo H.","year":"2019","unstructured":"H. Koo , S. Ghavamnia , and M. Polychronakis . 2019 . Configuration-Driven Software Debloating. In Proceedings of the European Workshop on Systems Security (EUROSEC) . ACM , 9 : 1 \u2013 9 :6. H. Koo, S. Ghavamnia, and M. Polychronakis. 2019. Configuration-Driven Software Debloating. In Proceedings of the European Workshop on Systems Security (EUROSEC). ACM, 9:1\u20139:6.","journal-title":"ACM"},{"volume-title":"Companion Publication of the Annual Conference on Genetic and Evolutionary Computation. ACM, USA, 833\u2013838","author":"Landsborough J.","key":"e_1_3_2_1_19_1","unstructured":"J. Landsborough , S. Harding , and S. Fugate . 2015. Removing the Kitchen Sink from Software . In Companion Publication of the Annual Conference on Genetic and Evolutionary Computation. ACM, USA, 833\u2013838 . J. Landsborough, S. Harding, and S. Fugate. 2015. Removing the Kitchen Sink from Software. In Companion Publication of the Annual Conference on Genetic and Evolutionary Computation. ACM, USA, 833\u2013838."},{"volume-title":"Proceedings of the Conference on Programming Language Design and Implementation (PLDI). ACM, 190\u2013200","author":"Luk C.","key":"e_1_3_2_1_20_1","unstructured":"C. Luk , R. Cohn , R. Muth , H. Patil , A. Klauser , G. Lowney , S. Wallace , V.\u00a0 J. Reddi , and K. Hazelwood . 2005. Pin: Building Customized Program Analysis Tools with Dynamic Instrumentation . In Proceedings of the Conference on Programming Language Design and Implementation (PLDI). ACM, 190\u2013200 . C. Luk, R. Cohn, R. Muth, H. Patil, A. Klauser, G. Lowney, S. Wallace, V.\u00a0J. Reddi, and K. Hazelwood. 2005. Pin: Building Customized Program Analysis Tools with Dynamic Instrumentation. In Proceedings of the Conference on Programming Language Design and Implementation (PLDI). ACM, 190\u2013200."},{"volume-title":"Proceedings of the International Conference on Software Engineering (ICSE). 142\u2013151","author":"Misherghi G.","key":"e_1_3_2_1_21_1","unstructured":"G. Misherghi and Z. Su . 2006. HDD: Hierarchical Delta Debugging . In Proceedings of the International Conference on Software Engineering (ICSE). 142\u2013151 . G. Misherghi and Z. Su. 2006. HDD: Hierarchical Delta Debugging. In Proceedings of the International Conference on Software Engineering (ICSE). 142\u2013151."},{"key":"e_1_3_2_1_22_1","unstructured":"Nathan\u00a0P Myhrvold. 1997. The Next Fifty Years of Software. https:\/\/studylib.net\/doc\/17972106\/97-the-next-fifty-years-of-software-acm.  Nathan\u00a0P Myhrvold. 1997. The Next Fifty Years of Software. https:\/\/studylib.net\/doc\/17972106\/97-the-next-fifty-years-of-software-acm."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","DOI":"10.1145\/844128.844162","article-title":"The Design and Implementation of Zap: A System for Migrating Computing Environments. SIGOPS","author":"Osman S.","year":"2002","unstructured":"S. Osman , D. Subhraveti , G. Su , and J. Nieh . 2002 . The Design and Implementation of Zap: A System for Migrating Computing Environments. SIGOPS Oper. Syst. Rev. 36 (Dec 2002), 361\u2013376. S. Osman, D. Subhraveti, G. Su, and J. Nieh. 2002. The Design and Implementation of Zap: A System for Migrating Computing Environments. SIGOPS Oper. Syst. Rev. 36 (Dec 2002), 361\u2013376.","journal-title":"Oper. Syst. Rev. 36"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security (ASIACCS). 903\u2013916","author":"Pashakhanloo Pardis","year":"2022","unstructured":"Pardis Pashakhanloo , Aravind Machiry , Hyonyoung Choi , Anthony Canino , Kihong Heo , Insup Lee , and Mayur Naik . 2022 . PacJam: Securing Dependencies Continuously via Package-Oriented Debloating . In Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security (ASIACCS). 903\u2013916 . Pardis Pashakhanloo, Aravind Machiry, Hyonyoung Choi, Anthony Canino, Kihong Heo, Insup Lee, and Mayur Naik. 2022. PacJam: Securing Dependencies Continuously via Package-Oriented Debloating. In Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security (ASIACCS). 903\u2013916."},{"volume-title":"Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). 164\u2013180","author":"Porter C.","key":"e_1_3_2_1_25_1","unstructured":"C. Porter , G. Mururu , P. Barua , and S. Pande . 2020. BlankIt Library Debloating: Getting What You Want Instead of Cutting What You Don\u2019t . In Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). 164\u2013180 . C. Porter, G. Mururu, P. Barua, and S. Pande. 2020. BlankIt Library Debloating: Getting What You Want Instead of Cutting What You Don\u2019t. In Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). 164\u2013180."},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the International Workshop on Security (IWSEC)","author":"Portokalidis Georgios","year":"2011","unstructured":"Georgios Portokalidis and Angelos\u00a0 D. Keromytis . 2011 . REASSURE: A Self-contained Mechanism for Healing Software Using Rescue Points . In Proceedings of the International Workshop on Security (IWSEC) ( Tokyo, Japan). Springer-Verlag, Berlin, Heidelberg, 16\u201332. Georgios Portokalidis and Angelos\u00a0D. Keromytis. 2011. REASSURE: A Self-contained Mechanism for Healing Software Using Rescue Points. In Proceedings of the International Workshop on Security (IWSEC) (Tokyo, Japan). Springer-Verlag, Berlin, Heidelberg, 16\u201332."},{"volume-title":"RAZOR: A Framework for Post-deployment Software Debloating. In USENIX Security Symposium. USENIX Association","author":"Qian C.","key":"e_1_3_2_1_27_1","unstructured":"C. Qian , H. Hu , M. Alharthi , P.\u00a0 H. Chung , T. Kim , and W. Lee . 2019 . RAZOR: A Framework for Post-deployment Software Debloating. In USENIX Security Symposium. USENIX Association , Santa Clara, CA, 1733\u20131750. C. Qian, H. Hu, M. Alharthi, P.\u00a0H. Chung, T. Kim, and W. Lee. 2019. RAZOR: A Framework for Post-deployment Software Debloating. In USENIX Security Symposium. USENIX Association, Santa Clara, CA, 1733\u20131750."},{"volume-title":"Proceedings of the USENIX Security Symposium. USENIX Association, USA, 869\u2013886","author":"Quach A.","key":"e_1_3_2_1_28_1","unstructured":"A. Quach , A. Prakash , and L. Yan . 2018. Debloating Software through Piece-Wise Compilation and Loading . In Proceedings of the USENIX Security Symposium. USENIX Association, USA, 869\u2013886 . A. Quach, A. Prakash, and L. Yan. 2018. Debloating Software through Piece-Wise Compilation and Loading. In Proceedings of the USENIX Security Symposium. USENIX Association, USA, 869\u2013886."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Nilo Redini Ruoyu Wang Aravind Machiry Yan Shoshitaishvili Giovanni Vigna and Christopher Kruegel. 2019. BinTrimmer: Towards Static Binary Debloating Through Abstract Interpretation. In Proceedings of the 16th International Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA) Roberto Perdisci Cl\u00e9mentine Maurice Giorgio Giacinto and Magnus Almgren (Eds.). 482\u2013501.  Nilo Redini Ruoyu Wang Aravind Machiry Yan Shoshitaishvili Giovanni Vigna and Christopher Kruegel. 2019. BinTrimmer: Towards Static Binary Debloating Through Abstract Interpretation. In Proceedings of the 16th International Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA) Roberto Perdisci Cl\u00e9mentine Maurice Giorgio Giacinto and Magnus Almgren (Eds.). 482\u2013501.","DOI":"10.1007\/978-3-030-22038-9_23"},{"volume-title":"Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). 335\u2013346","author":"Regehr J.","key":"e_1_3_2_1_30_1","unstructured":"J. Regehr , Y. Chen , P. Cuoq , E. Eide , C. Ellison , and X. Yang . 2012. Test-case Reduction for C Compiler Bugs . In Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). 335\u2013346 . J. Regehr, Y. Chen, P. Cuoq, E. Eide, C. Ellison, and X. Yang. 2012. Test-case Reduction for C Compiler Bugs. In Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). 335\u2013346."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"S. Sankaran J.\u00a0M. Squyres B. Barrett V. Sahay A. Lumsdaine J. Duell P. Hargrove and E. Roman. 2005. The Lam\/Mpi Checkpoint\/Restart Framework: System-Initiated Checkpointing. The International Journal of High Performance Computing Applications (2005) 479\u2013493.  S. Sankaran J.\u00a0M. Squyres B. Barrett V. Sahay A. Lumsdaine J. Duell P. Hargrove and E. Roman. 2005. The Lam\/Mpi Checkpoint\/Restart Framework: System-Initiated Checkpointing. The International Journal of High Performance Computing Applications (2005) 479\u2013493.","DOI":"10.1177\/1094342005056139"},{"key":"e_1_3_2_1_32_1","unstructured":"SecurityFocus. 2013. Nginx \u2019ngx_http_parse.c\u2019 Stack Buffer Overflow Vulnerability. https:\/\/www.securityfocus.com\/bid\/59699.  SecurityFocus. 2013. Nginx \u2019ngx_http_parse.c\u2019 Stack Buffer Overflow Vulnerability. https:\/\/www.securityfocus.com\/bid\/59699."},{"key":"e_1_3_2_1_33_1","unstructured":"Selectel. 2014. ftpbench. https:\/\/github.com\/selectel\/ftpbench.  Selectel. 2014. ftpbench. https:\/\/github.com\/selectel\/ftpbench."},{"volume-title":"Proceedings of the International Conference on Automated Software Engineering (ASE). ACM, 329\u2013339","author":"Sharif H.","key":"e_1_3_2_1_34_1","unstructured":"H. Sharif , M. Abubakar , A. Gehani , and F. Zaffar . 2018. TRIMMER: Application Specialization for Code Debloating . In Proceedings of the International Conference on Automated Software Engineering (ASE). ACM, 329\u2013339 . H. Sharif, M. Abubakar, A. Gehani, and F. Zaffar. 2018. TRIMMER: Application Specialization for Code Debloating. In Proceedings of the International Conference on Automated Software Engineering (ASE). ACM, 329\u2013339."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508250"},{"key":"e_1_3_2_1_37_1","volume-title":"CHAOS report","author":"Standish Group","year":"2009","unstructured":"Standish Group . 2009. CHAOS report 2009 . https:\/\/www.classes.cs.uchicago.edu\/archive\/2014\/fall\/51210-1\/required.reading\/Standish.Group.Chaos.2009.pdf. Standish Group. 2009. CHAOS report 2009. https:\/\/www.classes.cs.uchicago.edu\/archive\/2014\/fall\/51210-1\/required.reading\/Standish.Group.Chaos.2009.pdf."},{"volume-title":"Proceedings of the International Conference on Software Engineering (ICSE). 361\u2013371","author":"Sun C.","key":"e_1_3_2_1_38_1","unstructured":"C. Sun , Y. Li , Q. Zhang , T. Gu , and Z. Su . 2018. Perses: Syntax-guided Program Reduction . In Proceedings of the International Conference on Software Engineering (ICSE). 361\u2013371 . C. Sun, Y. Li, Q. Zhang, T. Gu, and Z. Su. 2018. Perses: Syntax-guided Program Reduction. In Proceedings of the International Conference on Software Engineering (ICSE). 361\u2013371."},{"key":"e_1_3_2_1_39_1","unstructured":"Synopsys Inc. 2020. The Heartbleed Bug. https:\/\/heartbleed.com\/.  Synopsys Inc. 2020. The Heartbleed Bug. https:\/\/heartbleed.com\/."},{"key":"e_1_3_2_1_40_1","unstructured":"WinSCP. 2020. Supported File Transfer Protocols. https:\/\/winscp.net\/eng\/docs\/protocols.  WinSCP. 2020. Supported File Transfer Protocols. https:\/\/winscp.net\/eng\/docs\/protocols."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","DOI":"10.1109\/32.988498","article-title":"Simplifying and Isolating Failure-Inducing Input","author":"Zeller A.","year":"2002","unstructured":"A. Zeller and R. Hildebrandt . 2002 . Simplifying and Isolating Failure-Inducing Input . IEEE Trans. Softw. Eng. ( Feb. 2002), 183\u2013200. A. Zeller and R. Hildebrandt. 2002. Simplifying and Isolating Failure-Inducing Input. IEEE Trans. Softw. Eng. (Feb. 2002), 183\u2013200.","journal-title":"IEEE Trans. Softw. Eng."},{"volume-title":"Proceedings of the Workshop on Binary Analysis Research (BAR). ISOC","author":"Zhen H.","key":"e_1_3_2_1_42_1","unstructured":"H. Zhen and T. Gang . 2019. Rapid Vulnerability Mitigation with Security Workarounds . In Proceedings of the Workshop on Binary Analysis Research (BAR). ISOC , Reston, VA, USA. H. Zhen and T. Gang. 2019. Rapid Vulnerability Mitigation with Security Workarounds. In Proceedings of the Workshop on Binary Analysis Research (BAR). ISOC, Reston, VA, USA."},{"volume-title":"Proceedings of the International Conference on Software Testing, Verification and Validation (ICST). IEEE, 421\u2013428","author":"Zimmermann T.","key":"e_1_3_2_1_43_1","unstructured":"T. Zimmermann , N. Nagappan , and L. Williams . 2010. Searching for a Needle in a Haystack: Predicting Security Vulnerabilities for Windows Vista . In Proceedings of the International Conference on Software Testing, Verification and Validation (ICST). IEEE, 421\u2013428 . T. Zimmermann, N. Nagappan, and L. Williams. 2010. Searching for a Needle in a Haystack: Predicting Security Vulnerabilities for Windows Vista. In Proceedings of the International Conference on Software Testing, Verification and Validation (ICST). IEEE, 421\u2013428."}],"event":{"name":"ASIA CCS '23: ACM ASIA Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Melbourne VIC Australia","acronym":"ASIA CCS '23"},"container-title":["Proceedings of the ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579856.3595796","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3579856.3595796","content-type":"text\/html","content-version":"vor","intended-application":"syndication"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:17Z","timestamp":1750183697000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579856.3595796"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,10]]},"references-count":43,"alternative-id":["10.1145\/3579856.3595796","10.1145\/3579856"],"URL":"https:\/\/doi.org\/10.1145\/3579856.3595796","relation":{},"subject":[],"published":{"date-parts":[[2023,7,10]]},"assertion":[{"value":"2023-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}