Effective program debloating via reinforcement learning
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Heo, Kihong | - |
dc.contributor.author | Lee, Woosuk | - |
dc.contributor.author | Pashakhanloo, Pardis | - |
dc.contributor.author | Naik, Mayur | - |
dc.date.accessioned | 2021-06-22T13:02:18Z | - |
dc.date.available | 2021-06-22T13:02:18Z | - |
dc.date.issued | 2018-10 | - |
dc.identifier.issn | 1543-7221 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/erica/handle/2021.sw.erica/7902 | - |
dc.description.abstract | Prevalent software engineering practices such as code reuse and the “one-size-fits-all” methodology have contributed to significant and widespread increases in the size and complexity of software. The resulting software bloat has led to decreased performance and increased security vulnerabilities. We propose a system called Chisel to enable programmers to effectively customize and debloat programs. Chisel takes as input a program to be debloated and a high-level specification of its desired functionality. The output is a reduced version of the program that is correct with respect to the specification. Chisel significantly improves upon existing program reduction systems by using a novel reinforcement learning-based approach to accelerate the search for the reduced program and scale to large programs. Our evaluation on a suite of 10 widely used UNIX utility programs each comprising 13-90 KLOC of C source code demonstrates that Chisel is able to successfully remove all unwanted functionalities and reduce attack surfaces. Compared to two state-of-the-art program reducers C-Reduce and Perses, which time out on 6 programs and 2 programs respectively in 12 hours, Chisel runs up to 7.1x and 3.7x faster and finishes on all programs. © 2018 Association for Computing Machinery. | - |
dc.format.extent | 15 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | Association for Computing Machinery | - |
dc.title | Effective program debloating via reinforcement learning | - |
dc.type | Article | - |
dc.publisher.location | 미국 | - |
dc.identifier.doi | 10.1145/3243734.3243838 | - |
dc.identifier.scopusid | 2-s2.0-85056847658 | - |
dc.identifier.wosid | 000461315900025 | - |
dc.identifier.bibliographicCitation | Proceedings of the ACM Conference on Computer and Communications Security, pp 380 - 394 | - |
dc.citation.title | Proceedings of the ACM Conference on Computer and Communications Security | - |
dc.citation.startPage | 380 | - |
dc.citation.endPage | 394 | - |
dc.type.docType | Conference Paper | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | other | - |
dc.relation.journalResearchArea | Computer ScienceEngineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.subject.keywordPlus | Computer software reusability | - |
dc.subject.keywordPlus | Reinforcement learning | - |
dc.subject.keywordPlus | Specifications | - |
dc.subject.keywordPlus | Tools | - |
dc.subject.keywordPlus | Utility programs | - |
dc.subject.keywordPlus | Code reuse | - |
dc.subject.keywordPlus | Effective programs | - |
dc.subject.keywordPlus | High level specification | - |
dc.subject.keywordPlus | Large programs | - |
dc.subject.keywordPlus | Reduction systems | - |
dc.subject.keywordPlus | Security vulnerabilities | - |
dc.subject.keywordPlus | Software engineering practices | - |
dc.subject.keywordPlus | Source codes | - |
dc.subject.keywordPlus | C (programming language) | - |
dc.subject.keywordAuthor | Program debloating | - |
dc.subject.keywordAuthor | reinforcement learning | - |
dc.identifier.url | https://dl.acm.org/doi/10.1145/3243734.3243838 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
55 Hanyangdeahak-ro, Sangnok-gu, Ansan, Gyeonggi-do, 15588, Korea+82-31-400-4269 sweetbrain@hanyang.ac.kr
COPYRIGHT © 2021 HANYANG UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.