Author:
Xu Guoqing,Mitchell Nick,Arnold Matthew,Rountev Atanas,Sevitsky Gary
Cited by
52 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. SoK: A Tale of Reduction, Security, and Correctness - Evaluating Program Debloating Paradigms and Their Compositions;Computer Security – ESORICS 2023;2024
2. Evaluating Container Debloaters;2023 IEEE Secure Development Conference (SecDev);2023-10-18
3. Module-Based Approach for Detecting Performance Bugs in Java Applications at Scale;IECON 2023- 49th Annual Conference of the IEEE Industrial Electronics Society;2023-10-16
4. Coverage-Based Debloating for Java Bytecode;ACM Transactions on Software Engineering and Methodology;2023-04-04
5. DJXPerf: Identifying Memory Inefficiencies via Object-Centric Profiling for Java;Proceedings of the 21st ACM/IEEE International Symposium on Code Generation and Optimization;2023-02-17