Modern software often struggles with bloat, leading to increased memory consumption and security vulnerabilities from unused code. In response, various program debloating techniques have been developed, typically utilizing test cases that represents functionalities users want to retain. These methods range from aggressive approaches, which prioritize maximal code reduction but may overfit to test cases and potentially reintroduce past security issues, to conservative strategies that aim to preserve all influenced code, often at the expense of less effective bloat reduction and security improvement. In this research, we present RLDebloatDU, an innovative debloating technique that employs 1-DU chain minimality within abstract syntax trees. Our approach maintains essential program data dependencies, striking a balance between aggressive code reduction and the preservation of program semantics. We evaluated RLDebloatDU on ten Linux kernel programs, comparing its performance with two leading debloating techniques: Chisel, known for its aggressive debloating approach, and Razor, recognized for its conservative strategy. Our findings reveal that while RLDebloatDU modestly sacrifices reduction in average binary size compared to Chisel, it notably surpasses Razor. In terms of reducing gadgets, which are indicative of attackable space, RLDebloatDU demonstrates parity with Chisel and superiority over Razor. Most importantly, RLDebloatDU shows enhanced performance in improving security by significantly reducing occurrences of Common Vulnerabilities and Exposures (CVEs) compared to both Chisel and Razor. These findings highlight RLDebloatDU’s ability to effectively reduce attackable space akin to aggressive debloating methods, while simultaneously avoiding the reintroduction of previously resolved security issues.
Fri 19 AprDisplayed time zone: Lisbon change
10:30 - 11:00 | |||
10:30 30mPoster | Exploring the Effectiveness of LLM based Test-driven Interactive Code Generation: User Study and Empirical Evaluation Posters Sarah Fakhoury Microsoft Research, Aaditya Naik University of Pennsylvania, Georgios Sakkas University of California at San Diego, Saikat Chakraborty Microsoft Research, Madan Musuvathi Microsoft Research, Shuvendu K. Lahiri Microsoft Research | ||
10:30 30mPoster | On the Need for Empirically Investigating Fast-Growing Programming Languages Posters Jahnavi Kumar Indian Institute of Technology Tirupati, India, Sridhar Chimalakonda Indian Institute of Technology, Tirupati | ||
10:30 30mPoster | Decoding Log Parsing Challenges: A Comprehensive Taxonomy for Actionable Solutions Posters Issam Sedki Concordia University, Wahab Hamou-Lhadj Concordia University, Montreal, Canada, Otmane Ait-Mohamed Concordia University, Naser Ezzati Jivan , Mohammed Shehab Concordia University | ||
10:30 30mPoster | Automated Code Editing with Search-Generate-Modify Posters Changshu Liu Columbia University, Pelin Cetin Columbia University, Yogesh Patodia Columbia University, Baishakhi Ray AWS AI Labs, Saikat Chakraborty Microsoft Research, Yangruibo Ding Columbia University | ||
10:30 30mPoster | Exploring the Impact of Inheritance on Test Code Maintainability Posters | ||
10:30 30mPoster | Improving Program Debloating with 1-DU Chain Minimality Posters Myeongsoo Kim Georgia Institute of Technology, Santosh Pande Georgia Institute of Technology, Alessandro Orso Georgia Institute of Technology Pre-print | ||
10:30 30mPoster | GoSpeechLess: Interoperable Serverless ML-based Cloud Services Posters Sashko Ristov University of Innsbruck, Philipp Gritsch University of Innsbruck, David Meyer University of Innsbruck, Michael Felderer German Aerospace Center (DLR) & University of Cologne | ||
10:30 30mPoster | Towards Precise Observations of Neural Model Robustness in Classification Posters Wenchuan Mu ISTD, Singapore University of Technology and Design, Kwan Hui Lim Singapore University of Technology and Design, Singapore | ||
10:30 30mPoster | Assessing AI-Based Code Assistants in Method Generation Tasks Posters Vincenzo Corso University of Milano - Bicocca, Leonardo Mariani University of Milano-Bicocca, Daniela Micucci University of Milano-Bicocca, Italy, Oliviero Riganelli University of Milano - Bicocca | ||
10:30 30mPoster | Recovering Traceability Links between Release Notes and Related Software Artifacts Posters | ||
10:30 30mPoster | Improving the Condensing of Reverse Engineered Class Diagrams using Weighted Network Metrics Posters Weifeng Pan Zhejiang Gongshang University, Wei Wu Zhejiang Gongshang University, Hua Ming Oakland University, Dae-Kyoo Kim Oakland University, Jinkai Yang Oakland University, Ruochen Liu Oakland University Media Attached | ||
10:30 30mPoster | Exploring Data Cleanness in Defects4J and Its Influence on Fault Localization Efficiency Posters Md Nakhla Rafi Concordia University, An Ran Chen University of Alberta, Tse-Hsun (Peter) Chen Concordia University, Shaohua Wang Central University of Finance and Economics | ||
10:30 30mPoster | Learning to Represent Patches Posters Xunzhu Tang University of Luxembourg, Haoye Tian University of Melbourne, Zhenghan Chen Peking University, Weiguo Pian University of Luxembourg, Saad Ezzini Lancaster University, Abdoul Kader Kaboré University of Luxembourg, Andrew Habib ABB Corporate Research, Germany, Jacques Klein University of Luxembourg, Tegawendé F. Bissyandé University of Luxembourg | ||
10:30 30mPoster | Bringing Structure to Naturalness: On the Naturalness of ASTs Posters Profir-Petru Pârțachi National Institute of Informatics, Japan, Mahito Sugiyama National Institute of Informatics, Japan |