Author:
Xu Guoqing,Mitchell Nick,Arnold Matthew,Rountev Atanas,Sevitsky Gary
Cited by
60 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. SoK: A Tale of Reduction, Security, and Correctness - Evaluating Program Debloating Paradigms and Their Compositions;Lecture Notes in Computer Science;2024
2. Evaluating Container Debloaters;2023 IEEE Secure Development Conference (SecDev);2023-10-18
3. Module-Based Approach for Detecting Performance Bugs in Java Applications at Scale;IECON 2023- 49th Annual Conference of the IEEE Industrial Electronics Society;2023-10-16
4. DJXPerf: Identifying Memory Inefficiencies via Object-Centric Profiling for Java;Proceedings of the 21st ACM/IEEE International Symposium on Code Generation and Optimization;2023-02-17
5. Decker: Attack Surface Reduction via On-Demand Code Mapping;Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2;2023-01-27