2013 IEEE 24th International Symposium on Software Reliability Engineering (ISSRE) 2013
DOI: 10.1109/issre.2013.6698894
|View full text |Cite
|
Sign up to set email alerts
|

Systematic testing for resource leaks in Android applications

Abstract: The use of mobile devices and the complexity of their software continue to grow rapidly. This growth presents significant challenges for software correctness and performance. In addition to traditional defects, a key consideration are defects related to the limited resources available on these devices. Resource leaks in an application, due to improper management of resources, can lead to slowdowns, crashes, and negative user experience. Despite a large body of existing work on leak detection, testing for resou… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
34
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 45 publications
(34 citation statements)
references
References 31 publications
0
34
0
Order By: Relevance
“…Aspect‐oriented programming can spot memory leaks at runtime, as discussed by Jain and Gopalani, but that work has not been extended from Java to Android yet. Testing has been used to find leaks by Yan et al They identify a sequence of dangerous user actions, which often lead to a leak, and replay them automatically to simulate dangerous behaviors. Testing has been applied to some common memory leak patterns by Shahriar et al, similar to those in Section 2.…”
Section: Related Workmentioning
confidence: 99%
“…Aspect‐oriented programming can spot memory leaks at runtime, as discussed by Jain and Gopalani, but that work has not been extended from Java to Android yet. Testing has been used to find leaks by Yan et al They identify a sequence of dangerous user actions, which often lead to a leak, and replay them automatically to simulate dangerous behaviors. Testing has been applied to some common memory leak patterns by Shahriar et al, similar to those in Section 2.…”
Section: Related Workmentioning
confidence: 99%
“…LeakDroid [27] repeatedly executes event cycles that should have a neutral effect on the resource usage, while monitoring the execution to identify potential leaks. Orion [18] performs semantics preserving mutations of a program to test the correctness of optimizing compilers.…”
Section: Related Workmentioning
confidence: 99%
“…As a supplement or alternative to manually written test suites, many automated testing techniques have been created aiming to find bugs with little or no help from the developer [3,4,6,7,12,13,14,22,23,25,27,29]. The primary advantage of such techniques is that they can, in principle, explore the state space more extensively, including the unusual event sequences.…”
Section: Introductionmentioning
confidence: 99%
“…A variety of other defect patterns can be defined, based on some notion of "interesting" WTG paths and relevant operations inside the callbacks along such paths. For example, one could consider resource leaks �e.g., for heap memory, native memory, JNI references, or threads [45]) or more general typestate-like properties [10,31] that need to be tracked across sequences of callbacks. Second, the control-flow analysis could be generalized to represent multiple threads running concurrently with the main UI thread, both for general Java threads and for Android-specific constructs such as asynchronous tasks and services.…”
Section: Discussionmentioning
confidence: 99%