Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security 2018
DOI: 10.1145/3243734.3243838
|View full text |Cite
|
Sign up to set email alerts
|

Effective Program Debloating via Reinforcement Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
56
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 90 publications
(56 citation statements)
references
References 24 publications
0
56
0
Order By: Relevance
“…While these techniques can be helpful for applications where trace information is available, both works (1) require post-hoc analysis of program traces, and do not automatically adapt their policies in real time, and (2) minimize time spent in GC mechanisms, as opposed to optimizing a user-defined reward function (e.g., request latency). Many previous works have applied reinforcement learning to various systems problems, including query optimization [22,28], cluster scheduling [20], stream processing [29], software debloating [8], and cloud provisioning [21,27].…”
Section: Related Workmentioning
confidence: 99%
“…While these techniques can be helpful for applications where trace information is available, both works (1) require post-hoc analysis of program traces, and do not automatically adapt their policies in real time, and (2) minimize time spent in GC mechanisms, as opposed to optimizing a user-defined reward function (e.g., request latency). Many previous works have applied reinforcement learning to various systems problems, including query optimization [22,28], cluster scheduling [20], stream processing [29], software debloating [8], and cloud provisioning [21,27].…”
Section: Related Workmentioning
confidence: 99%
“…Additionally, it does not scale and did not even terminate when removing a feature from the echo application of coreutils. Chisel [22] aims to support programmers to debloat programs. It needs the source code and a high-level specification of its functionalities to remove unwanted features with the help of delta debugging.…”
Section: Related Workmentioning
confidence: 99%
“…Existing feature-based debloating techniques require complex specifications and advanced software analysis techniques which have a high technical barrier to entry for the typical end user. For example, CHISEL [3] requires a test script that compiles the source code, executes it with inputs corresponding to desired and undesired features, and tests the output of each run to determine if the resulting program is correct [14]. Even for small programs, CHISEL requires long, complex scripts that test a large number of concrete inputs to produce debloated variants.…”
Section: Several Debloating Techniquesmentioning
confidence: 99%
“…Gadget introduction can negatively impact security, and multiple debloating and analysis iterations may be required to achieve a desirable result. Techniques such as CHISEL are not well suited for this task, as debloating operations can take hours to complete [3].…”
Section: Several Debloating Techniquesmentioning
confidence: 99%
See 1 more Smart Citation