Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
97 tokens/sec
GPT-4o
53 tokens/sec
Gemini 2.5 Pro Pro
43 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

The Used, the Bloated, and the Vulnerable: Reducing the Attack Surface of an Industrial Application (2108.05115v1)

Published 11 Aug 2021 in cs.SE

Abstract: Software reuse may result in software bloat when significant portions of application dependencies are effectively unused. Several tools exist to remove unused (byte)code from an application or its dependencies, thus producing smaller artifacts and, potentially, reducing the overall attack surface. In this paper we evaluate the ability of three debloating tools to distinguish which dependency classes are necessary for an application to function correctly from those that could be safely removed. To do so, we conduct a case study on a real-world commercial Java application. Our study shows that the tools we used were able to correctly identify a considerable amount of redundant code, which could be removed without altering the results of the existing application tests. One of the redundant classes turned out to be (formerly) vulnerable, confirming that this technique has the potential to be applied for hardening purposes. However, by manually reviewing the results of our experiments, we observed that none of the tools can handle a widely used default mechanism for dynamic class loading.

User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (4)
  1. Serena Elisa Ponta (11 papers)
  2. Wolfram Fischer (7 papers)
  3. Henrik Plate (12 papers)
  4. Antonino Sabetta (16 papers)
Citations (15)

Summary

We haven't generated a summary for this paper yet.