DC Field | Value | Language |
---|---|---|
dc.contributor.author | Heo, Kihong | ko |
dc.contributor.author | Lee, Woosuk | ko |
dc.contributor.author | Pashakhanloo, Pardis | ko |
dc.contributor.author | Naik, Mayur | ko |
dc.date.accessioned | 2020-11-12T01:55:15Z | - |
dc.date.available | 2020-11-12T01:55:15Z | - |
dc.date.created | 2020-11-09 | - |
dc.date.issued | 2018-10-15 | - |
dc.identifier.citation | 25th ACM Conference on Computer and Communications Security, CCS 2018, pp.380 - 394 | - |
dc.identifier.uri | http://hdl.handle.net/10203/277249 | - |
dc.description.abstract | Prevalent software engineering practices such as code reuse and the “one-size-fits-all” methodology have contributed to significant and widespread increases in the size and complexity of software. The resulting software bloat has led to decreased performance and increased security vulnerabilities. We propose a system called Chisel to enable programmers to effectively customize and debloat programs. Chisel takes as input a program to be debloated and a high-level specification of its desired functionality. The output is a reduced version of the program that is correct with respect to the specification. Chisel significantly improves upon existing program reduction systems by using a novel reinforcement learning-based approach to accelerate the search for the reduced program and scale to large programs. Our evaluation on a suite of 10 widely used UNIX utility programs each comprising 13-90 KLOC of C source code demonstrates that Chisel is able to successfully remove all unwanted functionalities and reduce attack surfaces. Compared to two state-of-the-art program reducers C-Reduce and Perses, which time out on 6 programs and 2 programs respectively in 12 hours, Chisel runs up to 7.1x and 3.7x faster and finishes on all programs. | - |
dc.language | English | - |
dc.publisher | Association for Computing Machinery | - |
dc.title | Effective program debloating via reinforcement learning | - |
dc.type | Conference | - |
dc.identifier.wosid | 000461315900025 | - |
dc.identifier.scopusid | 2-s2.0-85056847658 | - |
dc.type.rims | CONF | - |
dc.citation.beginningpage | 380 | - |
dc.citation.endingpage | 394 | - |
dc.citation.publicationname | 25th ACM Conference on Computer and Communications Security, CCS 2018 | - |
dc.identifier.conferencecountry | CN | - |
dc.identifier.conferencelocation | Toronto | - |
dc.identifier.doi | 10.1145/3243734.3243838 | - |
dc.contributor.localauthor | Heo, Kihong | - |
dc.contributor.nonIdAuthor | Lee, Woosuk | - |
dc.contributor.nonIdAuthor | Pashakhanloo, Pardis | - |
dc.contributor.nonIdAuthor | Naik, Mayur | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.