Filters








688 Hits in 5.1 sec

Practical memory leak detector based on parameterized procedural summaries

Yungbum Jung, Kwangkeun Yi
2008 Proceedings of the 7th international symposium on Memory management - ISMM '08  
What information to capture in each procedural summary has been carefully tuned so that the summary should not lose any common memory-leak-related behaviors in real-world C programs.  ...  Each procedural summary is parameterized by the procedure's call context so that it can be instantiated at different call sites.  ...  We thank Will Klieber for his very kind and detailed comments on our English, as well as technical, presentation. We thank the anonymous reviewers for their helpful comments.  ... 
doi:10.1145/1375634.1375653 dblp:conf/iwmm/JungY08 fatcat:yi4fte3s4zaqlb6o72qba2ytia

Memory Leak Detection Based on Memory State Transition Graph

Zhenbo Xu, Jian Zhang, Zhongxing Xu
2011 2011 18th Asia-Pacific Software Engineering Conference  
In order to do interprocedural analysis, our algorithm generates a summary for each procedure from the MSTG and applies the summary at the procedure's call sites.  ...  Memory leak is a common type of defect that is hard to detect manually. Existing memory leak detection tools suffer from lack of precise interprocedural alias and path conditions.  ...  [6] is a flow-sensitive and context-sensitive memory leak detector. It is based on a practical ownership model for managing memory.  ... 
doi:10.1109/apsec.2011.22 dblp:conf/apsec/XuZX11 fatcat:7z7dxygjgjdf7mr275wi5cgi6u

Static detection of leaks in polymorphic containers

David L. Heine, Monica S. Lam
2006 Proceeding of the 28th international conference on Software engineering - ICSE '06  
This paper presents the first practical static analysis tool that can find memory leaks and double deletions of objects held in polymorphic containers.  ...  The tool is based on the concept of object ownership: every object has one and only one owning pointer.  ...  Effectiveness of Static Leak Detection We use Valgrind [24] to evaluate our static memory leak detector by the volume of leaks identified.  ... 
doi:10.1145/1134285.1134321 dblp:conf/icse/HeineL06 fatcat:v6my62cbrjhb3pv3h5j554m7iy

Saturn

Yichen Xie, Alex Aiken
2007 ACM Transactions on Programming Languages and Systems  
We have experimentally validated our approach by conducting two case studies involving a Linux lock checker and a memory leak checker.  ...  Second, summaries in the spirit of type signatures are computed for each function, allowing inter-procedural analysis without a dramatic increase in the size of the boolean constraints to be solved.  ...  . · 25 CASE STUDY II: THE LEAK DETECTOR In this section, we present a static memory leak detector based on the path sensitive pointer analysis in Saturn.  ... 
doi:10.1145/1232420.1232423 fatcat:dokdkocywbhynlp6nuejff3wuy

Static memory leak detection using full-sparse value-flow analysis

Yulei Sui, Ding Ye, Jingling Xue
2012 Proceedings of the 2012 International Symposium on Software Testing and Analysis - ISSTA 2012  
We introduce a static detector, Saber, for detecting memory leaks in C programs.  ...  Leveraging recent advances on sparse pointer analysis, Saber is the first to use a full-sparse value-flow analysis for leak detection.  ...  Sparrow [9] relies on abstract interpretation to detect leaks in C programs. It models a function using a parameterized summary and uses the summary to analyze all the call sites to the function.  ... 
doi:10.1145/2338965.2336784 dblp:conf/issta/SuiYX12 fatcat:xmlghfbnlzawnk4dbss6pei64y

Detecting Memory Leaks Statically with Full-Sparse Value-Flow Analysis

Yulei Sui, Ding Ye, Jingling Xue
2014 IEEE Transactions on Software Engineering  
We introduce a static detector, SABER, for detecting memory leaks in C programs.  ...  Leveraging recent advances on sparse pointer analysis, SABER is the first to use a full-sparse value-flow analysis for detecting memory leaks statically.  ...  SPARROW [11] relies on abstract interpretation to detect leaks in C programs. It models a function using a parameterized summary and uses the summary to analyze all the call sites to the function.  ... 
doi:10.1109/tse.2014.2302311 fatcat:itnbg4tzr5ew5eepvdymldgqj4

On the Usefulness of Liveness for Garbage Collection and Leak Detection [chapter]

Martin Hirzel, Amer Diwan, Antony Hosking
2001 Lecture Notes in Computer Science  
The effectiveness of garbage collectors and leak detectors in identifying dead objects depends on the "accuracy" of their reachability traversal.  ...  We show that while liveness can significantly improve the effectiveness of a garbage collector or leak detector, the simpler liveness schemes are largely ineffective.  ...  We also thank Michael Hind and Urs Hoelzle for comments on a draft of this paper, and John DeTreville for fruitful discussions about our methodology and results.  ... 
doi:10.1007/3-540-45337-7_11 fatcat:ifak5pyitzenxo4nd2hekh3644

International symposium of memory management (ISMM 2008)

Richard Jones, Steve Blackburn
2008 SIGPLAN notices  
The ACM SIGPLAN International Symposium on Memory Management (ISMM) is a premier forum for research in the management of dynamically allocated memory.  ...  programs that make significant use of dynamic memory.  ...  Practical Memory Leak Detector Based on Parameterized Procedural Summaries, Yungbum Jung and Kwangkeun Yi We present a static analyzer that detects memory leaks in C programs.  ... 
doi:10.1145/1416216.1416220 fatcat:eronoartqragvclrmae7fiosxq

A practical flow-sensitive and context-sensitive C and C++ memory leak detector

David L. Heine, Monica S. Lam
2003 SIGPLAN notices  
We have developed a type system to formalize a practical ownership model of memory management.  ...  Programs satisfying this model do not leak memory or delete the same object more than once.  ...  EXPERIMENTAL RESULTS Clouseau, the memory leak detector we implemented, incorporates all the techniques described in this paper.  ... 
doi:10.1145/780822.781150 fatcat:gg6ababdrrevtimowrh3mhztq4

A practical flow-sensitive and context-sensitive C and C++ memory leak detector

David L. Heine, Monica S. Lam
2003 Proceedings of the ACM SIGPLAN 2003 conference on Programming language design and implementation - PLDI '03  
We have developed a type system to formalize a practical ownership model of memory management.  ...  Programs satisfying this model do not leak memory or delete the same object more than once.  ...  EXPERIMENTAL RESULTS Clouseau, the memory leak detector we implemented, incorporates all the techniques described in this paper.  ... 
doi:10.1145/781131.781150 dblp:conf/pldi/HeineL03 fatcat:qiwfgeqggvcyvn5cyf3hoy6wni

A practical flow-sensitive and context-sensitive C and C++ memory leak detector

David L. Heine, Monica S. Lam
2003 Proceedings of the ACM SIGPLAN 2003 conference on Programming language design and implementation - PLDI '03  
We have developed a type system to formalize a practical ownership model of memory management.  ...  Programs satisfying this model do not leak memory or delete the same object more than once.  ...  EXPERIMENTAL RESULTS Clouseau, the memory leak detector we implemented, incorporates all the techniques described in this paper.  ... 
doi:10.1145/781147.781150 fatcat:r4xp7g3vgjcpjbouxxcfwm7mrq

Threat Intelligence Computing

Xiaokui Shu, Frederico Araujo, Douglas L. Schales, Marc Ph. Stoecklin, Jiyong Jang, Heqing Huang, Josyula R. Rao
2018 Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security - CCS '18  
Cyber threat hunting is the process of proactively and iteratively formulating and validating threat hypotheses based on securityrelevant observations and domain knowledge.  ...  The platform was evaluated in a two-week DARPA competition for threat detection on a test bed comprising a wide variety of systems monitored in real time.  ...  The authors thank all monitoring teams in the DARPA program for providing provenance data on a wide variety of systems.  ... 
doi:10.1145/3243734.3243829 dblp:conf/ccs/ShuASSJHR18 fatcat:koae4rb6xbc4licneanbcfwysm

Alias Analysis for Object-Oriented Programs [chapter]

Manu Sridharan, Satish Chandra, Julian Dolby, Stephen J. Fink, Eran Yahav
2013 Lecture Notes in Computer Science  
We have found that for real-world programs, an under-approximate alias analysis based on access-path tracking often provides the best results for a variety of practical clients.  ...  We then describe flow-sensitive techniques based on tracking of access paths, which can yield greater precision for certain clients.  ...  Access Paths Abstractions based on allocation sites impose a fixed partition on memory locations.  ... 
doi:10.1007/978-3-642-36946-9_8 fatcat:f4v62o24r5dztec7h7exgfle2y

The ATLAS Simulation Infrastructure [chapter]

G. Aad, B. Abbott, J. Abdallah, A. A. Abdelalim, A. Abdesselam, O. Abdinov, B. Abi, M. Abolins, H. Abramowicz, H. Abreu, B. S. Acharya, D. L. Adams (+2583 others)
2011 The Performance of the ATLAS Detector  
detectors.  ...  Abstract The simulation software for the ATLAS Experiment at the Large Hadron Collider is being used for largescale production of events on the LHC Computing Grid.  ...  We acknowledge equally warmly all our technical colleagues in the collaborating Institutions without whom the ATLAS detector could not have been built.  ... 
doi:10.1007/978-3-642-22116-3_5 fatcat:exntkaruibghfo5tsep53ikrzi

The ATLAS Simulation Infrastructure

G. Aad, B. Abbott, J. Abdallah, A. A. Abdelalim, A. Abdesselam, O. Abdinov, B. Abi, M. Abolins, H. Abramowicz, H. Abreu, B. S. Acharya, D. L. Adams (+2583 others)
2010 European Physical Journal C: Particles and Fields  
detectors.  ...  The simulation software for the ATLAS Experiment at the Large Hadron Collider is being used for large-scale production of events on the LHC Computing Grid.  ...  We acknowledge equally warmly all our technical colleagues in the collaborating Institutions without whom the ATLAS detector could not have been built.  ... 
doi:10.1140/epjc/s10052-010-1429-9 fatcat:q64g2miqw5cfpkyz3jh5e7bulu
« Previous Showing results 1 — 15 out of 688 results