2010
DOI: 10.1007/978-3-642-12029-9_20
|View full text |Cite
|
Sign up to set email alerts
|

Memory Leaks Detection in Java by Bi-abductive Inference

Abstract: Abstract. This paper describes a compositional analysis algorithm for statically detecting leaks in Java programs. The algorithm is based on separation logic and exploits the concept of bi-abductive inference for identifying the objects which are reachable but no longer used by the program.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 20 publications
(7 citation statements)
references
References 26 publications
0
7
0
Order By: Relevance
“…Approaches using Shape Graph [7], pointer analysis [25], escape analysis [30], shape analysis [11], contradiction analysis [24], liveness analysis [27], ownership model [14,15], procedural summaries [6], bi-abductive inferences [18], and value flow [4,28] are some of the prominent ones. LCLInt is a static leak detection tool which annotates the source code with formal specifications [9].…”
Section: Static Methodsmentioning
confidence: 99%
“…Approaches using Shape Graph [7], pointer analysis [25], escape analysis [30], shape analysis [11], contradiction analysis [24], liveness analysis [27], ownership model [14,15], procedural summaries [6], bi-abductive inferences [18], and value flow [4,28] are some of the prominent ones. LCLInt is a static leak detection tool which annotates the source code with formal specifications [9].…”
Section: Static Methodsmentioning
confidence: 99%
“…At its core, our analysis uses abductive reasoning [Calcagno et al 2011] to discover redundancies, that is, state used earlier in the program that will not be accessed subsequent to the current program point. Using abduction in this way was first proposed in [Distefano and Filipović 2010], where it is used to discover memory leaks, albeit without conditionals, procedures, loops, or code specialization.…”
Section: Related Work In Detailmentioning
confidence: 98%
“…Abduction-based Verification. Many memory safety verifiers based on separation logic use abductive (or bi-abductive) reasoning for performing modular heap reasoning [5,34,35]. In these approaches, abductive reasoning is used to infer missing preconditions of procedures.…”
Section: Related Workmentioning
confidence: 99%