Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Effective program debloating via reinforcement learning

Full metadata record
DC Field Value Language
dc.contributor.authorHeo, Kihong-
dc.contributor.authorLee, Woosuk-
dc.contributor.authorPashakhanloo, Pardis-
dc.contributor.authorNaik, Mayur-
dc.date.accessioned2021-06-22T13:02:18Z-
dc.date.available2021-06-22T13:02:18Z-
dc.date.issued2018-10-
dc.identifier.issn1543-7221-
dc.identifier.urihttps://scholarworks.bwise.kr/erica/handle/2021.sw.erica/7902-
dc.description.abstractPrevalent software engineering practices such as code reuse and the “one-size-fits-all” methodology have contributed to significant and widespread increases in the size and complexity of software. The resulting software bloat has led to decreased performance and increased security vulnerabilities. We propose a system called Chisel to enable programmers to effectively customize and debloat programs. Chisel takes as input a program to be debloated and a high-level specification of its desired functionality. The output is a reduced version of the program that is correct with respect to the specification. Chisel significantly improves upon existing program reduction systems by using a novel reinforcement learning-based approach to accelerate the search for the reduced program and scale to large programs. Our evaluation on a suite of 10 widely used UNIX utility programs each comprising 13-90 KLOC of C source code demonstrates that Chisel is able to successfully remove all unwanted functionalities and reduce attack surfaces. Compared to two state-of-the-art program reducers C-Reduce and Perses, which time out on 6 programs and 2 programs respectively in 12 hours, Chisel runs up to 7.1x and 3.7x faster and finishes on all programs. © 2018 Association for Computing Machinery.-
dc.format.extent15-
dc.language영어-
dc.language.isoENG-
dc.publisherAssociation for Computing Machinery-
dc.titleEffective program debloating via reinforcement learning-
dc.typeArticle-
dc.publisher.location미국-
dc.identifier.doi10.1145/3243734.3243838-
dc.identifier.scopusid2-s2.0-85056847658-
dc.identifier.wosid000461315900025-
dc.identifier.bibliographicCitationProceedings of the ACM Conference on Computer and Communications Security, pp 380 - 394-
dc.citation.titleProceedings of the ACM Conference on Computer and Communications Security-
dc.citation.startPage380-
dc.citation.endPage394-
dc.type.docTypeConference Paper-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassother-
dc.relation.journalResearchAreaComputer ScienceEngineering-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.subject.keywordPlusComputer software reusability-
dc.subject.keywordPlusReinforcement learning-
dc.subject.keywordPlusSpecifications-
dc.subject.keywordPlusTools-
dc.subject.keywordPlusUtility programs-
dc.subject.keywordPlusCode reuse-
dc.subject.keywordPlusEffective programs-
dc.subject.keywordPlusHigh level specification-
dc.subject.keywordPlusLarge programs-
dc.subject.keywordPlusReduction systems-
dc.subject.keywordPlusSecurity vulnerabilities-
dc.subject.keywordPlusSoftware engineering practices-
dc.subject.keywordPlusSource codes-
dc.subject.keywordPlusC (programming language)-
dc.subject.keywordAuthorProgram debloating-
dc.subject.keywordAuthorreinforcement learning-
dc.identifier.urlhttps://dl.acm.org/doi/10.1145/3243734.3243838-
Files in This Item
Go to Link
Appears in
Collections
COLLEGE OF COMPUTING > ERICA 컴퓨터학부 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Woo suk photo

Lee, Woo suk
ERICA 소프트웨어융합대학 (ERICA 컴퓨터학부)
Read more

Altmetrics

Total Views & Downloads

BROWSE