Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2017
RL-Bin, Robust Low-overhead Binary Rewriter
FEAST '17: Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software TransformationNovember 2017, pp 17–22https://doi.org/10.1145/3141235.3141245Binary rewriters are used to ensure security properties or optimize and reduce runtime of existing binary applications. Existing binary rewriters are either static or dynamic, and both have severe shortcomings. Existing static rewriters have low ...
- research-articleNovember 2017
Binary Code Retrofitting and Hardening Using SGX
FEAST '17: Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software TransformationNovember 2017, pp 43–49https://doi.org/10.1145/3141235.3141244Trusted Execution Environment (TEE) is designed to deliver a safe execution environment for software systems. Intel Software Guard Extensions (SGX) provides isolated memory regions (i.e., SGX enclaves) to protect code and data from adversaries in the ...
- research-articleNovember 2017
DamGate: Dynamic Adaptive Multi-feature Gating in Program Binaries
FEAST '17: Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software TransformationNovember 2017, pp 23–29https://doi.org/10.1145/3141235.3141243Feature creep has emerged as a serious threat due to the growing number of utilities and capabilities crammed into modern software systems. While feature elimination and de-bloating techniques can produce slimmer executables, a complete elimination of ...
- research-articleNovember 2017
A Multi-OS Cross-Layer Study of Bloating in User Programs, Kernel and Managed Execution Environments
FEAST '17: Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software TransformationNovember 2017, pp 65–70https://doi.org/10.1145/3141235.3141242We present a study of bloating across the software stack. We study user-level programs, OS kernels and Java virtual machine. We employ: (1) static measurements to detect limits to debloating, and (2) dynamic measurements to detect how much of the code ...
- research-articleNovember 2017
New Directions for Container Debloating
FEAST '17: Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software TransformationNovember 2017, pp 51–56https://doi.org/10.1145/3141235.3141241Application containers, such as Docker containers, are light-weight virtualization environments that "contain" applications together with their resources and configuration information. While they are becoming increasingly popular as a method for agile ...
-
- research-articleNovember 2017
Zipr++: Exceptional Binary Rewriting
FEAST '17: Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software TransformationNovember 2017, pp 9–15https://doi.org/10.1145/3141235.3141240Current software development methodologies and practices, while enabling the production of large complex software systems, can have a serious negative impact on software quality. These negative impacts include excessive and unnecessary software ...
- research-articleNovember 2017
ReDroid: Prioritizing Data Flows and Sinks for App Security Transformation
FEAST '17: Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software TransformationNovember 2017, pp 35–41https://doi.org/10.1145/3141235.3141239Security transformation is to transfer applications to meet security guarantees. How to prioritize Android apps and find suitable transformation options is a challenging problem. Typical real-world apps have a large number of sensitive flows and sinks. ...