Binary Debloating for Security via Demand Driven Loading Article Swipe
YOU?
·
· 2019
· Open Access
·
· DOI: https://doi.org/10.48550/arxiv.1902.06570
Modern software systems heavily use C/C++ based libraries. Because of the weak memory model of C/C++, libraries may suffer from vulnerabilities which can expose the applications to potential attacks. For example, a very large number of return oriented programming gadgets exist in glibc that allow stitching together semantically valid but malicious Turing-complete programs. In spite of significant advances in attack detection and mitigation, full defense is unrealistic against an ever-growing set of possibilities for generating such malicious programs. In this work, we create a defense mechanism by debloating libraries to reduce the dynamic functions linked so that the possibilities of constructing malicious programs diminishes significantly. The key idea is to locate each library call site within an application, and in each case to load only the set of library functions that will be used at that call site. This approach of demand-driven loading relies on an input-aware oracle that predicts a near-exact set of library functions needed at a given call site during the execution. The predicted functions are loaded just in time, and the complete call chain (of function bodies) inside the library is purged after returning from the library call back into the application. We present a decision-tree based predictor, which acts as an oracle, and an optimized runtime system, which works directly with library binaries like GNU libc and libstdc++. We show that on average, the proposed scheme cuts the exposed code surface of libraries by 97.2%, reduces ROP gadgets present in linked libraries by 97.9%, achieves a prediction accuracy in most cases of at least 97%, and adds a small runtime overhead of 18% on all libraries (16% for glibc, 2% for others) across all benchmarks of SPEC 2006, suggesting this scheme is practical.
Related Topics
- Type
- preprint
- Language
- en
- Landing Page
- http://arxiv.org/abs/1902.06570
- https://arxiv.org/pdf/1902.06570
- OA Status
- green
- Cited By
- 3
- References
- 47
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W2913592991
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W2913592991Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.48550/arxiv.1902.06570Digital Object Identifier
- Title
-
Binary Debloating for Security via Demand Driven LoadingWork title
- Type
-
preprintOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2019Year of publication
- Publication date
-
2019-02-18Full publication date if available
- Authors
-
Girish Mururu, Chris Porter, Prithayan Barua, Santosh PandeList of authors in order
- Landing page
-
https://arxiv.org/abs/1902.06570Publisher landing page
- PDF URL
-
https://arxiv.org/pdf/1902.06570Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
greenOpen access status per OpenAlex
- OA URL
-
https://arxiv.org/pdf/1902.06570Direct OA link when available
- Concepts
-
Business, Computer science, EconomicsTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
3Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 1, 2021: 1, 2020: 1Per-year citation counts (last 5 years)
- References (count)
-
47Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W2913592991 |
|---|---|
| doi | https://doi.org/10.48550/arxiv.1902.06570 |
| ids.doi | https://doi.org/10.48550/arxiv.1902.06570 |
| ids.mag | 2913592991 |
| ids.openalex | https://openalex.org/W2913592991 |
| fwci | |
| type | preprint |
| title | Binary Debloating for Security via Demand Driven Loading |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T11424 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9998000264167786 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1702 |
| topics[0].subfield.display_name | Artificial Intelligence |
| topics[0].display_name | Security and Verification in Computing |
| topics[1].id | https://openalex.org/T12122 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9979000091552734 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1708 |
| topics[1].subfield.display_name | Hardware and Architecture |
| topics[1].display_name | Physical Unclonable Functions (PUFs) and Hardware Security |
| topics[2].id | https://openalex.org/T11241 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9976999759674072 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1711 |
| topics[2].subfield.display_name | Signal Processing |
| topics[2].display_name | Advanced Malware Detection Techniques |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C144133560 |
| concepts[0].level | 0 |
| concepts[0].score | 0.40342384576797485 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q4830453 |
| concepts[0].display_name | Business |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.34009552001953125 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C162324750 |
| concepts[2].level | 0 |
| concepts[2].score | 0.324399471282959 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q8134 |
| concepts[2].display_name | Economics |
| keywords[0].id | https://openalex.org/keywords/business |
| keywords[0].score | 0.40342384576797485 |
| keywords[0].display_name | Business |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.34009552001953125 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/economics |
| keywords[2].score | 0.324399471282959 |
| keywords[2].display_name | Economics |
| language | en |
| locations[0].id | pmh:oai:arXiv.org:1902.06570 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4306400194 |
| locations[0].source.issn | |
| locations[0].source.type | repository |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | arXiv (Cornell University) |
| locations[0].source.host_organization | https://openalex.org/I205783295 |
| locations[0].source.host_organization_name | Cornell University |
| locations[0].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[0].license | |
| locations[0].pdf_url | https://arxiv.org/pdf/1902.06570 |
| locations[0].version | submittedVersion |
| locations[0].raw_type | |
| locations[0].license_id | |
| locations[0].is_accepted | False |
| locations[0].is_published | False |
| locations[0].raw_source_name | |
| locations[0].landing_page_url | http://arxiv.org/abs/1902.06570 |
| locations[1].id | doi:10.48550/arxiv.1902.06570 |
| locations[1].is_oa | True |
| locations[1].source.id | https://openalex.org/S4306400194 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | True |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | arXiv (Cornell University) |
| locations[1].source.host_organization | https://openalex.org/I205783295 |
| locations[1].source.host_organization_name | Cornell University |
| locations[1].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[1].license | |
| locations[1].pdf_url | |
| locations[1].version | |
| locations[1].raw_type | article |
| locations[1].license_id | |
| locations[1].is_accepted | False |
| locations[1].is_published | |
| locations[1].raw_source_name | |
| locations[1].landing_page_url | https://doi.org/10.48550/arxiv.1902.06570 |
| indexed_in | arxiv, datacite |
| authorships[0].author.id | https://openalex.org/A5078573765 |
| authorships[0].author.orcid | https://orcid.org/0000-0003-0795-1434 |
| authorships[0].author.display_name | Girish Mururu |
| authorships[0].countries | US |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I130701444 |
| authorships[0].affiliations[0].raw_affiliation_string | #N#‡#N#Georgia Institute of Technology#N# |
| authorships[0].institutions[0].id | https://openalex.org/I130701444 |
| authorships[0].institutions[0].ror | https://ror.org/01zkghx44 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I130701444 |
| authorships[0].institutions[0].country_code | US |
| authorships[0].institutions[0].display_name | Georgia Institute of Technology |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Girish Mururu |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | #N#‡#N#Georgia Institute of Technology#N# |
| authorships[1].author.id | https://openalex.org/A5049228142 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-2821-2668 |
| authorships[1].author.display_name | Chris Porter |
| authorships[1].countries | US |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I130701444 |
| authorships[1].affiliations[0].raw_affiliation_string | #N#‡#N#Georgia Institute of Technology#N# |
| authorships[1].institutions[0].id | https://openalex.org/I130701444 |
| authorships[1].institutions[0].ror | https://ror.org/01zkghx44 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I130701444 |
| authorships[1].institutions[0].country_code | US |
| authorships[1].institutions[0].display_name | Georgia Institute of Technology |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Chris Porter |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | #N#‡#N#Georgia Institute of Technology#N# |
| authorships[2].author.id | https://openalex.org/A5006793409 |
| authorships[2].author.orcid | |
| authorships[2].author.display_name | Prithayan Barua |
| authorships[2].countries | US |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I130701444 |
| authorships[2].affiliations[0].raw_affiliation_string | #N#‡#N#Georgia Institute of Technology#N# |
| authorships[2].institutions[0].id | https://openalex.org/I130701444 |
| authorships[2].institutions[0].ror | https://ror.org/01zkghx44 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I130701444 |
| authorships[2].institutions[0].country_code | US |
| authorships[2].institutions[0].display_name | Georgia Institute of Technology |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Prithayan Barua |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | #N#‡#N#Georgia Institute of Technology#N# |
| authorships[3].author.id | https://openalex.org/A5061235810 |
| authorships[3].author.orcid | https://orcid.org/0000-0001-6723-8062 |
| authorships[3].author.display_name | Santosh Pande |
| authorships[3].countries | US |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I130701444 |
| authorships[3].affiliations[0].raw_affiliation_string | #N#‡#N#Georgia Institute of Technology#N# |
| authorships[3].institutions[0].id | https://openalex.org/I130701444 |
| authorships[3].institutions[0].ror | https://ror.org/01zkghx44 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I130701444 |
| authorships[3].institutions[0].country_code | US |
| authorships[3].institutions[0].display_name | Georgia Institute of Technology |
| authorships[3].author_position | last |
| authorships[3].raw_author_name | Santosh Pande |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | #N#‡#N#Georgia Institute of Technology#N# |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://arxiv.org/pdf/1902.06570 |
| open_access.oa_status | green |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Binary Debloating for Security via Demand Driven Loading |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T06:51:31.235846 |
| primary_topic.id | https://openalex.org/T11424 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9998000264167786 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1702 |
| primary_topic.subfield.display_name | Artificial Intelligence |
| primary_topic.display_name | Security and Verification in Computing |
| related_works | https://openalex.org/W2748952813, https://openalex.org/W4391375266, https://openalex.org/W2390279801, https://openalex.org/W2358668433, https://openalex.org/W2376932109, https://openalex.org/W2001405890, https://openalex.org/W2382290278, https://openalex.org/W2478288626, https://openalex.org/W4391913857, https://openalex.org/W2350741829 |
| cited_by_count | 3 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 1 |
| counts_by_year[1].year | 2021 |
| counts_by_year[1].cited_by_count | 1 |
| counts_by_year[2].year | 2020 |
| counts_by_year[2].cited_by_count | 1 |
| locations_count | 2 |
| best_oa_location.id | pmh:oai:arXiv.org:1902.06570 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306400194 |
| best_oa_location.source.issn | |
| best_oa_location.source.type | repository |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | arXiv (Cornell University) |
| best_oa_location.source.host_organization | https://openalex.org/I205783295 |
| best_oa_location.source.host_organization_name | Cornell University |
| best_oa_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| best_oa_location.license | |
| best_oa_location.pdf_url | https://arxiv.org/pdf/1902.06570 |
| best_oa_location.version | submittedVersion |
| best_oa_location.raw_type | |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | False |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | http://arxiv.org/abs/1902.06570 |
| primary_location.id | pmh:oai:arXiv.org:1902.06570 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4306400194 |
| primary_location.source.issn | |
| primary_location.source.type | repository |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | arXiv (Cornell University) |
| primary_location.source.host_organization | https://openalex.org/I205783295 |
| primary_location.source.host_organization_name | Cornell University |
| primary_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| primary_location.license | |
| primary_location.pdf_url | https://arxiv.org/pdf/1902.06570 |
| primary_location.version | submittedVersion |
| primary_location.raw_type | |
| primary_location.license_id | |
| primary_location.is_accepted | False |
| primary_location.is_published | False |
| primary_location.raw_source_name | |
| primary_location.landing_page_url | http://arxiv.org/abs/1902.06570 |
| publication_date | 2019-02-18 |
| publication_year | 2019 |
| referenced_works | https://openalex.org/W2074943483, https://openalex.org/W2080313875, https://openalex.org/W2138517425, https://openalex.org/W2760313715, https://openalex.org/W2963899731, https://openalex.org/W2109219878, https://openalex.org/W2891196279, https://openalex.org/W2122757982, https://openalex.org/W2129586531, https://openalex.org/W2056608406, https://openalex.org/W2052951836, https://openalex.org/W2124360577, https://openalex.org/W1429241971, https://openalex.org/W2119177527, https://openalex.org/W2030405312, https://openalex.org/W1990535818, https://openalex.org/W1495630617, https://openalex.org/W1993736952, https://openalex.org/W2156858199, https://openalex.org/W2167753650, https://openalex.org/W2150196852, https://openalex.org/W2516933175, https://openalex.org/W2008015263, https://openalex.org/W2072102701, https://openalex.org/W2341864083, https://openalex.org/W2951505538, https://openalex.org/W2101234009, https://openalex.org/W2162800072, https://openalex.org/W2140557450, https://openalex.org/W2114882853, https://openalex.org/W2133638476, https://openalex.org/W2891688103, https://openalex.org/W2170922286, https://openalex.org/W1969031936, https://openalex.org/W2584029330, https://openalex.org/W2015083179, https://openalex.org/W2170927924, https://openalex.org/W2028800816, https://openalex.org/W2612611921, https://openalex.org/W1823377586, https://openalex.org/W1969501726, https://openalex.org/W2293825325, https://openalex.org/W2101857770, https://openalex.org/W2069568053, https://openalex.org/W1963947298, https://openalex.org/W1576911972, https://openalex.org/W1972142043 |
| referenced_works_count | 47 |
| abstract_inverted_index.a | 31, 83, 150, 158, 198, 250, 262 |
| abstract_inverted_index.2% | 274 |
| abstract_inverted_index.In | 53, 78 |
| abstract_inverted_index.We | 196, 223 |
| abstract_inverted_index.an | 68, 116, 145, 205, 208 |
| abstract_inverted_index.as | 204 |
| abstract_inverted_index.at | 134, 157, 257 |
| abstract_inverted_index.be | 132 |
| abstract_inverted_index.by | 86, 238, 247 |
| abstract_inverted_index.in | 41, 58, 119, 171, 244, 253 |
| abstract_inverted_index.is | 65, 108, 184, 286 |
| abstract_inverted_index.of | 9, 14, 35, 55, 71, 99, 127, 140, 153, 236, 256, 266, 280 |
| abstract_inverted_index.on | 144, 226, 268 |
| abstract_inverted_index.so | 95 |
| abstract_inverted_index.to | 26, 89, 109, 122 |
| abstract_inverted_index.we | 81 |
| abstract_inverted_index.(of | 178 |
| abstract_inverted_index.18% | 267 |
| abstract_inverted_index.For | 29 |
| abstract_inverted_index.GNU | 219 |
| abstract_inverted_index.ROP | 241 |
| abstract_inverted_index.The | 105, 165 |
| abstract_inverted_index.all | 269, 278 |
| abstract_inverted_index.and | 61, 118, 173, 207, 221, 260 |
| abstract_inverted_index.are | 168 |
| abstract_inverted_index.but | 49 |
| abstract_inverted_index.can | 22 |
| abstract_inverted_index.for | 73, 272, 275 |
| abstract_inverted_index.key | 106 |
| abstract_inverted_index.may | 17 |
| abstract_inverted_index.set | 70, 126, 152 |
| abstract_inverted_index.the | 10, 24, 91, 97, 125, 163, 174, 182, 189, 194, 228, 232 |
| abstract_inverted_index.use | 4 |
| abstract_inverted_index.(16% | 271 |
| abstract_inverted_index.97%, | 259 |
| abstract_inverted_index.SPEC | 281 |
| abstract_inverted_index.This | 138 |
| abstract_inverted_index.acts | 203 |
| abstract_inverted_index.adds | 261 |
| abstract_inverted_index.back | 192 |
| abstract_inverted_index.call | 113, 136, 160, 176, 191 |
| abstract_inverted_index.case | 121 |
| abstract_inverted_index.code | 234 |
| abstract_inverted_index.cuts | 231 |
| abstract_inverted_index.each | 111, 120 |
| abstract_inverted_index.from | 19, 188 |
| abstract_inverted_index.full | 63 |
| abstract_inverted_index.idea | 107 |
| abstract_inverted_index.into | 193 |
| abstract_inverted_index.just | 170 |
| abstract_inverted_index.libc | 220 |
| abstract_inverted_index.like | 218 |
| abstract_inverted_index.load | 123 |
| abstract_inverted_index.most | 254 |
| abstract_inverted_index.only | 124 |
| abstract_inverted_index.show | 224 |
| abstract_inverted_index.site | 114, 161 |
| abstract_inverted_index.such | 75 |
| abstract_inverted_index.that | 43, 96, 130, 135, 148, 225 |
| abstract_inverted_index.this | 79, 284 |
| abstract_inverted_index.used | 133 |
| abstract_inverted_index.very | 32 |
| abstract_inverted_index.weak | 11 |
| abstract_inverted_index.will | 131 |
| abstract_inverted_index.with | 215 |
| abstract_inverted_index.2006, | 282 |
| abstract_inverted_index.C/C++ | 5 |
| abstract_inverted_index.after | 186 |
| abstract_inverted_index.allow | 44 |
| abstract_inverted_index.based | 6, 200 |
| abstract_inverted_index.cases | 255 |
| abstract_inverted_index.chain | 177 |
| abstract_inverted_index.exist | 40 |
| abstract_inverted_index.given | 159 |
| abstract_inverted_index.glibc | 42 |
| abstract_inverted_index.large | 33 |
| abstract_inverted_index.least | 258 |
| abstract_inverted_index.model | 13 |
| abstract_inverted_index.site. | 137 |
| abstract_inverted_index.small | 263 |
| abstract_inverted_index.spite | 54 |
| abstract_inverted_index.time, | 172 |
| abstract_inverted_index.valid | 48 |
| abstract_inverted_index.which | 21, 202, 212 |
| abstract_inverted_index.work, | 80 |
| abstract_inverted_index.works | 213 |
| abstract_inverted_index.97.2%, | 239 |
| abstract_inverted_index.97.9%, | 248 |
| abstract_inverted_index.C/C++, | 15 |
| abstract_inverted_index.Modern | 0 |
| abstract_inverted_index.across | 277 |
| abstract_inverted_index.attack | 59 |
| abstract_inverted_index.create | 82 |
| abstract_inverted_index.during | 162 |
| abstract_inverted_index.expose | 23 |
| abstract_inverted_index.glibc, | 273 |
| abstract_inverted_index.inside | 181 |
| abstract_inverted_index.linked | 94, 245 |
| abstract_inverted_index.loaded | 169 |
| abstract_inverted_index.locate | 110 |
| abstract_inverted_index.memory | 12 |
| abstract_inverted_index.needed | 156 |
| abstract_inverted_index.number | 34 |
| abstract_inverted_index.oracle | 147 |
| abstract_inverted_index.purged | 185 |
| abstract_inverted_index.reduce | 90 |
| abstract_inverted_index.relies | 143 |
| abstract_inverted_index.return | 36 |
| abstract_inverted_index.scheme | 230, 285 |
| abstract_inverted_index.suffer | 18 |
| abstract_inverted_index.within | 115 |
| abstract_inverted_index.Because | 8 |
| abstract_inverted_index.against | 67 |
| abstract_inverted_index.bodies) | 180 |
| abstract_inverted_index.defense | 64, 84 |
| abstract_inverted_index.dynamic | 92 |
| abstract_inverted_index.exposed | 233 |
| abstract_inverted_index.gadgets | 39, 242 |
| abstract_inverted_index.heavily | 3 |
| abstract_inverted_index.library | 112, 128, 154, 183, 190, 216 |
| abstract_inverted_index.loading | 142 |
| abstract_inverted_index.oracle, | 206 |
| abstract_inverted_index.others) | 276 |
| abstract_inverted_index.present | 197, 243 |
| abstract_inverted_index.reduces | 240 |
| abstract_inverted_index.runtime | 210, 264 |
| abstract_inverted_index.surface | 235 |
| abstract_inverted_index.system, | 211 |
| abstract_inverted_index.systems | 2 |
| abstract_inverted_index.accuracy | 252 |
| abstract_inverted_index.achieves | 249 |
| abstract_inverted_index.advances | 57 |
| abstract_inverted_index.approach | 139 |
| abstract_inverted_index.attacks. | 28 |
| abstract_inverted_index.average, | 227 |
| abstract_inverted_index.binaries | 217 |
| abstract_inverted_index.complete | 175 |
| abstract_inverted_index.directly | 214 |
| abstract_inverted_index.example, | 30 |
| abstract_inverted_index.function | 179 |
| abstract_inverted_index.oriented | 37 |
| abstract_inverted_index.overhead | 265 |
| abstract_inverted_index.predicts | 149 |
| abstract_inverted_index.programs | 102 |
| abstract_inverted_index.proposed | 229 |
| abstract_inverted_index.software | 1 |
| abstract_inverted_index.together | 46 |
| abstract_inverted_index.detection | 60 |
| abstract_inverted_index.functions | 93, 129, 155, 167 |
| abstract_inverted_index.libraries | 16, 88, 237, 246, 270 |
| abstract_inverted_index.malicious | 50, 76, 101 |
| abstract_inverted_index.mechanism | 85 |
| abstract_inverted_index.optimized | 209 |
| abstract_inverted_index.potential | 27 |
| abstract_inverted_index.predicted | 166 |
| abstract_inverted_index.programs. | 52, 77 |
| abstract_inverted_index.returning | 187 |
| abstract_inverted_index.stitching | 45 |
| abstract_inverted_index.benchmarks | 279 |
| abstract_inverted_index.debloating | 87 |
| abstract_inverted_index.diminishes | 103 |
| abstract_inverted_index.execution. | 164 |
| abstract_inverted_index.generating | 74 |
| abstract_inverted_index.libraries. | 7 |
| abstract_inverted_index.libstdc++. | 222 |
| abstract_inverted_index.near-exact | 151 |
| abstract_inverted_index.practical. | 287 |
| abstract_inverted_index.prediction | 251 |
| abstract_inverted_index.predictor, | 201 |
| abstract_inverted_index.suggesting | 283 |
| abstract_inverted_index.input-aware | 146 |
| abstract_inverted_index.mitigation, | 62 |
| abstract_inverted_index.programming | 38 |
| abstract_inverted_index.significant | 56 |
| abstract_inverted_index.unrealistic | 66 |
| abstract_inverted_index.application, | 117 |
| abstract_inverted_index.application. | 195 |
| abstract_inverted_index.applications | 25 |
| abstract_inverted_index.constructing | 100 |
| abstract_inverted_index.ever-growing | 69 |
| abstract_inverted_index.semantically | 47 |
| abstract_inverted_index.decision-tree | 199 |
| abstract_inverted_index.demand-driven | 141 |
| abstract_inverted_index.possibilities | 72, 98 |
| abstract_inverted_index.significantly. | 104 |
| abstract_inverted_index.Turing-complete | 51 |
| abstract_inverted_index.vulnerabilities | 20 |
| cited_by_percentile_year | |
| countries_distinct_count | 1 |
| institutions_distinct_count | 4 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/16 |
| sustainable_development_goals[0].score | 0.7699999809265137 |
| sustainable_development_goals[0].display_name | Peace, Justice and strong institutions |
| citation_normalized_percentile |