Effective program debloating via reinforcement learning

Cited 69 time in webofscience Cited 50 time in scopus
  • Hit : 181
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorHeo, Kihongko
dc.contributor.authorLee, Woosukko
dc.contributor.authorPashakhanloo, Pardisko
dc.contributor.authorNaik, Mayurko
dc.date.accessioned2020-11-12T01:55:15Z-
dc.date.available2020-11-12T01:55:15Z-
dc.date.created2020-11-09-
dc.date.issued2018-10-15-
dc.identifier.citation25th ACM Conference on Computer and Communications Security, CCS 2018, pp.380 - 394-
dc.identifier.urihttp://hdl.handle.net/10203/277249-
dc.description.abstractPrevalent software engineering practices such as code reuse and the “one-size-fits-all” methodology have contributed to significant and widespread increases in the size and complexity of software. The resulting software bloat has led to decreased performance and increased security vulnerabilities. We propose a system called Chisel to enable programmers to effectively customize and debloat programs. Chisel takes as input a program to be debloated and a high-level specification of its desired functionality. The output is a reduced version of the program that is correct with respect to the specification. Chisel significantly improves upon existing program reduction systems by using a novel reinforcement learning-based approach to accelerate the search for the reduced program and scale to large programs. Our evaluation on a suite of 10 widely used UNIX utility programs each comprising 13-90 KLOC of C source code demonstrates that Chisel is able to successfully remove all unwanted functionalities and reduce attack surfaces. Compared to two state-of-the-art program reducers C-Reduce and Perses, which time out on 6 programs and 2 programs respectively in 12 hours, Chisel runs up to 7.1x and 3.7x faster and finishes on all programs.-
dc.languageEnglish-
dc.publisherAssociation for Computing Machinery-
dc.titleEffective program debloating via reinforcement learning-
dc.typeConference-
dc.identifier.wosid000461315900025-
dc.identifier.scopusid2-s2.0-85056847658-
dc.type.rimsCONF-
dc.citation.beginningpage380-
dc.citation.endingpage394-
dc.citation.publicationname25th ACM Conference on Computer and Communications Security, CCS 2018-
dc.identifier.conferencecountryCN-
dc.identifier.conferencelocationToronto-
dc.identifier.doi10.1145/3243734.3243838-
dc.contributor.localauthorHeo, Kihong-
dc.contributor.nonIdAuthorLee, Woosuk-
dc.contributor.nonIdAuthorPashakhanloo, Pardis-
dc.contributor.nonIdAuthorNaik, Mayur-
Appears in Collection
CS-Conference Papers(학술회의논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 69 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0