TY - GEN
T1 - SoK
T2 - 28th European Symposium on Research in Computer Security, ESORICS 2023
AU - Ali, Muaz
AU - Muzammil, Muhammad
AU - Karim, Faraz
AU - Naeem, Ayesha
AU - Haroon, Rukhshan
AU - Haris, Muhammad
AU - Nadeem, Huzaifah
AU - Sabir, Waseem
AU - Shaon, Fahad
AU - Zaffar, Fareed
AU - Yegneswaran, Vinod
AU - Gehani, Ashish
AU - Rahaman, Sazzadur
N1 - Publisher Copyright:
© 2024, The Author(s), under exclusive license to Springer Nature Switzerland AG.
PY - 2024
Y1 - 2024
N2 - Automated software debloating of program source or binary code has tremendous potential to improve both application performance and security. Unfortunately, measuring and comparing the effectiveness of various debloating methods is challenging due to the absence of a universal benchmarking platform that can accommodate diverse approaches. In this paper, we first present DEBLOATBENCHA (Debloating benchmark for applications), an extensible and sustainable benchmarking platform that enables comparison of different research techniques. Then, we perform a holistic comparison of the techniques to assess the current progress. In the current version, we integrated four software debloating research tools: Chisel, Occam, Razor, and Piece-wise. Each tool is representative of a different class of debloaters: program source, compiler intermediate representation, executable binary, and external library. Our evaluation revealed interesting insights (i.e., hidden and explicit tradeoffs) about existing techniques, which might inspire future research. For example, all the binaries produced by Occam and Piece-Wise were correct, while Chisel significantly outperformed others in binary size and Gadget class reductions. In a first-of-its-kind composition, we also combined multiple debloaters to debloat a single binary. Our performance evaluation showed that, in both ASLR-proof and Turing-complete gadget expressively cases, several compositions (e.g., Chisel-Occam, Chisel-Occam-Razor) significantly outperformed the best-performing single tool (i.e., Chisel).
AB - Automated software debloating of program source or binary code has tremendous potential to improve both application performance and security. Unfortunately, measuring and comparing the effectiveness of various debloating methods is challenging due to the absence of a universal benchmarking platform that can accommodate diverse approaches. In this paper, we first present DEBLOATBENCHA (Debloating benchmark for applications), an extensible and sustainable benchmarking platform that enables comparison of different research techniques. Then, we perform a holistic comparison of the techniques to assess the current progress. In the current version, we integrated four software debloating research tools: Chisel, Occam, Razor, and Piece-wise. Each tool is representative of a different class of debloaters: program source, compiler intermediate representation, executable binary, and external library. Our evaluation revealed interesting insights (i.e., hidden and explicit tradeoffs) about existing techniques, which might inspire future research. For example, all the binaries produced by Occam and Piece-Wise were correct, while Chisel significantly outperformed others in binary size and Gadget class reductions. In a first-of-its-kind composition, we also combined multiple debloaters to debloat a single binary. Our performance evaluation showed that, in both ASLR-proof and Turing-complete gadget expressively cases, several compositions (e.g., Chisel-Occam, Chisel-Occam-Razor) significantly outperformed the best-performing single tool (i.e., Chisel).
KW - Benchmark
KW - Debloating Comparison
KW - Program Debloating
UR - http://www.scopus.com/inward/record.url?scp=85182604593&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85182604593&partnerID=8YFLogxK
U2 - 10.1007/978-3-031-51482-1_12
DO - 10.1007/978-3-031-51482-1_12
M3 - Conference contribution
AN - SCOPUS:85182604593
SN - 9783031514814
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 229
EP - 249
BT - Computer Security – ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings
A2 - Tsudik, Gene
A2 - Conti, Mauro
A2 - Liang, Kaitai
A2 - Smaragdakis, Georgios
PB - Springer Science and Business Media Deutschland GmbH
Y2 - 25 September 2023 through 29 September 2023
ER -