2008 the Eighth International Conference on Quality Software 2008
DOI: 10.1109/qsic.2008.12
|View full text |Cite
|
Sign up to set email alerts
|

Path and Context Sensitive Inter-procedural Memory Leak Detection

Abstract: This paper presents a practical path and context sensitive inter-procedural analysis method for detecting memory leaks in C programs. A novel memory object model and function summary system are used. Preliminary experiments show that the method is effective. Several memory leaks have been found in real programs including which and wget.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…One major memory-related phenomenon which indicates the existence of software aging is memory leak. Many memory leaking problems are difficult to detect, and there are few symptoms other than the slowing down of system performance and the steady increase in memory consumption [35]. Concisely put, memory leaking occurs when a process allocates memory during its execution, and continues to allocate more memory in each subsequent execution without freeing that previously used.…”
Section: Experimental Studymentioning
confidence: 99%
“…One major memory-related phenomenon which indicates the existence of software aging is memory leak. Many memory leaking problems are difficult to detect, and there are few symptoms other than the slowing down of system performance and the steady increase in memory consumption [35]. Concisely put, memory leaking occurs when a process allocates memory during its execution, and continues to allocate more memory in each subsequent execution without freeing that previously used.…”
Section: Experimental Studymentioning
confidence: 99%
“…Holley and Rosen [26] have introduced qualified dataflow analysis to distinguish infeasible paths from the remaining paths. Other researchers have used symbolic evaluation to detect infeasible paths [5], [6], [7], [8].…”
Section: Related Workmentioning
confidence: 99%
“…Accurate path-sensitive analyses require that: (a) execution effects along each path in a control-flow graph (CFG) are analyzed in isolation, i.e., without merging effects from different paths, and (b) effects along infeasible paths are excluded. The specific challenges for efficient and accurate path-sensitive analyses are thus: (a) exponential growth of the number of paths with the number of non-nested branch nodes in the CFG [1], [2], and (b) checking path feasibility requires checking satisfiability of branch conditions along the path, a process that also can incur exponential computation [3], [4], [5], [6], [7], [8].…”
Section: Introductionmentioning
confidence: 99%
“…Memory leaking in long running programs can cause system performance degradation, and even system crash [19]. Many memory leaking problems are subtle and hard to be detected.…”
Section: Memory Leakingmentioning
confidence: 99%
“…Many memory leaking problems are subtle and hard to be detected. They have few symptoms other than the slowing down system's performance and steady increase in memory consumption [19]. Memory leaks occur because a block of memory was not freed when it should, hence it is a primary cause for possible further system failure.Since memory leakings may jeopardize computer's performance by reducing the amount of available memory.This study focuses on identifying the existence of memory leaks caused by the Eucalyptus software.…”
Section: Memory Leakingmentioning
confidence: 99%