2004
DOI: 10.1145/1037949.1024412
|View full text |Cite
|
Sign up to set email alerts
|

Low-overhead memory leak detection using adaptive statistical profiling

Abstract: Sampling has been successfully used to identify performance optimization opportunities. We would like to apply similar techniques to check program correctness. Unfortunately, sampling provides poor coverage of infrequently executed code, where bugs often lurk. We describe an adaptive profiling scheme that addresses this by sampling executions of code segments at a rate inversely proportional to their execution frequency.To validate our ideas, we have implemented SWAT, a novel memory leak detection tool. SWAT t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
63
0

Year Published

2007
2007
2018
2018

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 40 publications
(63 citation statements)
references
References 11 publications
0
63
0
Order By: Relevance
“…If the original program executes in time R, and the instrumented program executes in time R + M with monitoring, we say that the monitoring overhead is M R . Recently, a number of techniques have been developed to mitigate the overhead due to RV [13,9,1,14,5]. Common to these approaches is the use of event sampling to reduce overhead.…”
Section: Introductionmentioning
confidence: 99%
“…If the original program executes in time R, and the instrumented program executes in time R + M with monitoring, we say that the monitoring overhead is M R . Recently, a number of techniques have been developed to mitigate the overhead due to RV [13,9,1,14,5]. Common to these approaches is the use of event sampling to reduce overhead.…”
Section: Introductionmentioning
confidence: 99%
“…The most widelyused dynamic approach to handling memory leaks is garbage collection [35,36,37,38], which adds runtime overhead to the program. There is also research on dynamic memoryleak detection [39,40,41,42,43,44,45], which provides the location of an allocation which will be leaked later. However, as discussed before, this information alone is still far away from fixing the leak.…”
Section: Related Workmentioning
confidence: 99%
“…Different from static approaches as the above and ours there are dynamic techniques for memory leak detection [10,16,11,23]. The main drawback with dynamic techniques is that they cannot give guarantees.…”
Section: Related Workmentioning
confidence: 99%