{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T20:14:13Z","timestamp":1730319253604,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,8,21]],"date-time":"2018-08-21T00:00:00Z","timestamp":1534809600000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Defence Advanced Research Agency","award":["FA8650-15-C-756"]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1564105, CNS-1228700, CNS-1565321, CNS-1228620"],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,8,21]]},"DOI":"10.1145\/3106237.3106271","type":"proceedings-article","created":{"date-parts":[[2017,8,2]],"date-time":"2017-08-02T19:36:18Z","timestamp":1501702578000},"page":"476-486","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":50,"title":["Cimplifier: automatically debloating containers"],"prefix":"10.1145","author":[{"given":"Vaibhav","family":"Rastogi","sequence":"first","affiliation":[{"name":"University of Wisconsin-Madison, USA"}]},{"given":"Drew","family":"Davidson","sequence":"additional","affiliation":[{"name":"Tala Security, USA"}]},{"given":"Lorenzo","family":"De Carli","sequence":"additional","affiliation":[{"name":"Colorado State University, USA"}]},{"given":"Somesh","family":"Jha","sequence":"additional","affiliation":[{"name":"University of Wisconsin-Madison, USA \/ Tala Security, USA"}]},{"given":"Patrick","family":"McDaniel","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,8,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Selenium IDE. Tool Documentation. http:\/\/www.seleniumhq.org\/docs\/02_ selenium_ide.jsp. Selenium IDE. Tool Documentation. http:\/\/www.seleniumhq.org\/docs\/02_ selenium_ide.jsp."},{"key":"e_1_3_2_1_2_1","unstructured":"BIGOT J.-T. L. April 2015. http:\/\/blog.yadutaf.fr\/2015\/04\/25\/ how-i-shrunk-a-docker-image-by-98-8-featuring-fanotify\/. BIGOT J.-T. L. April 2015. http:\/\/blog.yadutaf.fr\/2015\/04\/25\/ how-i-shrunk-a-docker-image-by-98-8-featuring-fanotify\/."},{"key":"e_1_3_2_1_3_1","first-page":"322","volume-title":"NSDI","author":"Bittau A.","year":"2008","unstructured":"Bittau , A. , Marchenko , P. , Handley , M. , and Karp , B . Wedge: Splitting applications into reduced-privilege compartments . In NSDI ( 2008 ), pp. 309\u2013 322 . Bittau, A., Marchenko, P., Handley, M., and Karp, B. Wedge: Splitting applications into reduced-privilege compartments. In NSDI (2008), pp. 309\u2013322."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.16"},{"key":"e_1_3_2_1_5_1","first-page":"72","volume-title":"USENIX Security Symposium","author":"Brumley D.","year":"2004","unstructured":"Brumley , D. , and Song , D . Privtrans: Automatically partitioning programs for privilege separation . In USENIX Security Symposium ( 2004 ), pp. 57\u2013 72 . Brumley, D., and Song, D. Privtrans: Automatically partitioning programs for privilege separation. In USENIX Security Symposium (2004), pp. 57\u201372."},{"key":"e_1_3_2_1_6_1","unstructured":"Docker and btrfs in practice. Docker documentation. https:\/\/docs.docker.com\/ engine\/userguide\/storagedriver\/btrfs-driver\/. Docker and btrfs in practice. Docker documentation. https:\/\/docs.docker.com\/ engine\/userguide\/storagedriver\/btrfs-driver\/."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.14778\/2350229.2350262"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1461928.1461949"},{"key":"e_1_3_2_1_9_1","first-page":"286","volume-title":"Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation-Volume 2","author":"Clark C.","year":"2005","unstructured":"Clark , C. , Fraser , K. , Hand , S. , Hansen , J. G. , Jul , E. , Limpach , C. , Pratt , I. , and Warfield , A . Live migration of virtual machines . In Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation-Volume 2 ( 2005 ), USENIX Association , pp. 273\u2013 286 . Clark, C., Fraser, K., Hand, S., Hansen, J. G., Jul, E., Limpach, C., Pratt, I., and Warfield, A. Live migration of virtual machines. In Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation-Volume 2 (2005), USENIX Association, pp. 273\u2013286."},{"volume-title":"Web Article","year":"2015","key":"e_1_3_2_1_10_1","unstructured":"8 surprising facts about real docker adoption . Web Article , October 2015 . https: \/\/www.datadoghq.com\/docker-adoption\/. 8 surprising facts about real docker adoption. Web Article, October 2015. https: \/\/www.datadoghq.com\/docker-adoption\/."},{"volume-title":"Optimizing docker images","year":"2014","author":"deHamer B.","key":"e_1_3_2_1_11_1","unstructured":"deHamer , B. Optimizing docker images . CenturyLink Developer Center Blog , July 2014 . https:\/\/www.ctl.io\/developers\/blog\/post\/optimizing-docker-images\/. deHamer, B. Optimizing docker images. CenturyLink Developer Center Blog, July 2014. https:\/\/www.ctl.io\/developers\/blog\/post\/optimizing-docker-images\/."},{"key":"e_1_3_2_1_12_1","unstructured":"Docker. Website. https:\/\/www.docker.com\/. Docker. Website. https:\/\/www.docker.com\/."},{"key":"e_1_3_2_1_13_1","unstructured":"Understand images containers and storage drivers. Docker documentation. https: \/\/docs.docker.com\/engine\/userguide\/storagedriver\/imagesandcontainers\/. Understand images containers and storage drivers. Docker documentation. https: \/\/docs.docker.com\/engine\/userguide\/storagedriver\/imagesandcontainers\/."},{"key":"e_1_3_2_1_14_1","unstructured":"Docker security. Docker documentation. https:\/\/docs.docker.com\/engine\/ security\/security\/. Docker security. Docker documentation. https:\/\/docs.docker.com\/engine\/ security\/security\/."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380210802"},{"volume-title":"Blog","year":"2015","author":"Dowideit S.","key":"e_1_3_2_1_16_1","unstructured":"Dowideit , S. Slim application containers (using docker) . Blog , April 2015 . http:\/\/fosiki.com\/blog\/2015\/04\/28\/slim-application-containers-using-docker\/. Dowideit, S. Slim application containers (using docker). Blog, April 2015. http:\/\/fosiki.com\/blog\/2015\/04\/28\/slim-application-containers-using-docker\/."},{"key":"e_1_3_2_1_17_1","unstructured":"The elastic stack | make sense of your data. Website. https:\/\/www.elastic.co\/ products. The elastic stack | make sense of your data. Website. https:\/\/www.elastic.co\/ products."},{"key":"e_1_3_2_1_18_1","unstructured":"The 2016 workshop on forming an ecosystem around software transformation (feast) October 2016. https:\/\/sites.google.com\/site\/ccsfeast16\/. The 2016 workshop on forming an ecosystem around software transformation (feast) October 2016. https:\/\/sites.google.com\/site\/ccsfeast16\/."},{"volume-title":"USENIX Annual Technical Conference","year":"2011","author":"Guo P. J.","key":"e_1_3_2_1_19_1","unstructured":"Guo , P. J. , and Engler , D. R . Cde: Using system call interposition to automatically create portable software packages . In USENIX Annual Technical Conference ( 2011 ). Guo, P. J., and Engler, D. R. Cde: Using system call interposition to automatically create portable software packages. In USENIX Annual Technical Conference (2011)."},{"key":"e_1_3_2_1_20_1","unstructured":"Haproxy \u2013 the reliable high performance tcp\/http load balancer. Website. http: \/\/www.haproxy.org\/. Haproxy \u2013 the reliable high performance tcp\/http load balancer. Website. http: \/\/www.haproxy.org\/."},{"volume-title":"HotOS","year":"2005","author":"Krohn M. N.","key":"e_1_3_2_1_21_1","unstructured":"Krohn , M. N. , Efstathopoulos , P. , Frey , C. , Kaashoek , M. F. , Kohler , E. , Mazieres , D. , Morris , R. , Osborne , M. , VanDeBogart , S. , and Ziegler , D . Make least privilege a right (not a privilege) . In HotOS ( 2005 ). Krohn, M. N., Efstathopoulos, P., Frey, C., Kaashoek, M. F., Kohler, E., Mazieres, D., Morris, R., Osborne, M., VanDeBogart, S., and Ziegler, D. Make least privilege a right (not a privilege). In HotOS (2005)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Kumar A. May 2015. Kumar A. May 2015.","DOI":"10.1016\/S0958-2118(15)30223-8"},{"key":"e_1_3_2_1_23_1","unstructured":"https:\/\/medium.com\/@aneeshep\/ working-with-dockers-64c8bc4b5f92#.f3i10qkyt. https:\/\/medium.com\/@aneeshep\/ working-with-dockers-64c8bc4b5f92#.f3i10qkyt."},{"key":"e_1_3_2_1_24_1","unstructured":"Linux containers. Website. https:\/\/linuxcontainers.org\/. Linux containers. Website. https:\/\/linuxcontainers.org\/."},{"key":"e_1_3_2_1_25_1","unstructured":"MediaWiki. Website. https:\/\/www.mediawiki.org\/wiki\/MediaWiki. MediaWiki. Website. https:\/\/www.mediawiki.org\/wiki\/MediaWiki."},{"key":"e_1_3_2_1_26_1","unstructured":"MongoDB. Website. https:\/\/www.mongodb.org\/. MongoDB. Website. https:\/\/www.mongodb.org\/."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/292540.292561"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/268998.266669"},{"key":"e_1_3_2_1_29_1","unstructured":"Nginx. Website. http:\/\/nginx.org\/en\/. Nginx. Website. http:\/\/nginx.org\/en\/."},{"key":"e_1_3_2_1_30_1","unstructured":"Oracle. https:\/\/github.com\/oracle\/crashcart. Oracle. https:\/\/github.com\/oracle\/crashcart."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/844128.844162"},{"key":"e_1_3_2_1_32_1","unstructured":"Parasoft c\/c++test. https:\/\/www.parasoft.com\/product\/cpptest\/. Parasoft c\/c++test. https:\/\/www.parasoft.com\/product\/cpptest\/."},{"key":"e_1_3_2_1_33_1","volume-title":"USENIX Security","volume":"3","author":"Provos N.","year":"2003","unstructured":"Provos , N. , Friedl , M. , and Honeyman , P . Preventing privilege escalation . In USENIX Security ( 2003 ), vol. 3 . Provos, N., Friedl, M., and Honeyman, P. Preventing privilege escalation. In USENIX Security (2003), vol. 3."},{"key":"e_1_3_2_1_34_1","unstructured":"Quest K. C. https:\/\/github.com\/cloudimmunity\/docker-slim. Quest K. C. https:\/\/github.com\/cloudimmunity\/docker-slim."},{"key":"e_1_3_2_1_35_1","unstructured":"Redis. Website. http:\/\/redis.io\/. Redis. Website. http:\/\/redis.io\/."},{"key":"e_1_3_2_1_36_1","unstructured":"Docker registry. Website. https:\/\/docs.docker.com\/registry\/. Docker registry. Website. https:\/\/docs.docker.com\/registry\/."},{"key":"e_1_3_2_1_37_1","unstructured":"Linux audit. Website. https:\/\/people.redhat.com\/sgrubb\/audit\/. Linux audit. Website. https:\/\/people.redhat.com\/sgrubb\/audit\/."},{"key":"e_1_3_2_1_38_1","unstructured":"Docker adoption doubles in a year February 2016. http: \/\/www.datacenterdynamics.com\/content-tracks\/servers-storage\/ docker-adoption-doubles-in-a-year\/95703.fullarticle. Docker adoption doubles in a year February 2016. http: \/\/www.datacenterdynamics.com\/content-tracks\/servers-storage\/ docker-adoption-doubles-in-a-year\/95703.fullarticle."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9939"},{"key":"e_1_3_2_1_40_1","unstructured":"Swamp: Software assurance marketplace. https:\/\/continuousassurance.org\/. Swamp: Software assurance marketplace. https:\/\/continuousassurance.org\/."},{"volume-title":"June","year":"2015","author":"van Holsteijn M.","key":"e_1_3_2_1_41_1","unstructured":"van Holsteijn , M. How to create the smallest possible docker container of any image. Xebia blog , June 2015 . http:\/\/blog.xebia.com\/ how-to-create-the-smallest-possible-docker-container-of-any-image\/. van Holsteijn, M. How to create the smallest possible docker container of any image. Xebia blog, June 2015. http:\/\/blog.xebia.com\/ how-to-create-the-smallest-possible-docker-container-of-any-image\/."},{"key":"e_1_3_2_1_42_1","unstructured":"WordPress.org. Website. https:\/\/wordpress.org\/. WordPress.org. Website. https:\/\/wordpress.org\/."}],"event":{"name":"ESEC\/FSE'17: Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Paderborn Germany","acronym":"ESEC\/FSE'17"},"container-title":["Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3106237.3106271","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3106237.3106271","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,5]],"date-time":"2023-01-05T17:52:51Z","timestamp":1672941171000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3106237.3106271"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,21]]},"references-count":42,"alternative-id":["10.1145\/3106237.3106271","10.1145\/3106237"],"URL":"http:\/\/dx.doi.org\/10.1145\/3106237.3106271","relation":{},"subject":[],"published":{"date-parts":[[2017,8,21]]},"assertion":[{"value":"2017-08-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}