A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Study on Abnormal Behaviour in Mobile Application
2014
OALib
Current analysis and detection of abnormal applications behavior are still not comprehensive enough where behavior under user visible failure category such as crash, "stopped unexpectedly" and "not responding ...
An incorrect or insufficient implementation of application lifecycle, memory related issues and malicious application might cause an unexpected behavior of the application such as bad usability, not responding ...
A specific tool for memory analysis is Memory Analyzer Tool (MAT). ...
doi:10.4236/oalib.1101229
fatcat:s2moxna77ndmrdsmuruz5jff6e
Do Memories Haunt You? An Automated Black Box Testing Approach for Detecting Memory Leaks in Android Apps
2020
IEEE Access
The study also illustrates how memory leak causes can be detected with the support of the information provided by the FunesDroid tool. ...
In order to detect and characterize these memory leaks, we present FunesDroid, a toolsupported black box technique for the automatic detection of memory leaks tied to the Activity Lifecycle in Android ...
Sellitto and G. D'Alterio for their contributions to the prototyping of the FunesDroid tool and to the analysis of some of the found memory leaks. ...
doi:10.1109/access.2020.2966522
fatcat:kloyjf6lhnhplfmzktz5wtfhca
A Detection and Measurement Approach for Memory Leaked Objects in Java Programs
2015
IEICE transactions on information and systems
The experimental results show that our approach is able to detect and measure memory leaked objects efficiently. key words: memory leak, heap information, leaked objects, memory leaking confidence ...
This paper presents a dynamic approach for detecting and measuring memory leaked objects in Java programs. ...
Acknowledgments This work was supported partly by the National Natural Science Foundation of China [No.60970032] and the 333 Project. ...
doi:10.1587/transinf.2014edp7320
fatcat:6q7nuzvv3jcrdmahvh6gdmij5a
DoubleTake: Fast and Precise Error Detection via Evidence-Based Dynamic Analysis
[article]
2016
arXiv
pre-print
We demonstrate DoubleTake's generality and efficiency by building dynamic analyses that find buffer overflows, memory use-after-free errors, and memory leaks. ...
The key insight of evidence-based dynamic analysis is that for a class of errors, it is possible to ensure that evidence that they happened at some point in the past remains for later detection. ...
We thank Kostya Serebryany for his assistance with our evaluation of Ad-dressSanitizer, and Qiang Zeng, Dinghao Wu and Peng Liu for providing the test cases used in their Cruiser paper. ...
arXiv:1601.07962v1
fatcat:ljbiukfwffbgraj5px43tfj4rq
Performance Analysis and Problem Determination in SOA Environments
[chapter]
2012
Lecture Notes in Computer Science
We note that, in practice Java language and the associated J2EE stack remains one of the most popular runtime environment for implementing SOA. ...
However, we make the case that at least part of the performance analysis process can be automated and offered as a service. ...
We would like to thank Ravi Kothari and Manish Gupta from IBM Research -India, Ashish Agrawal from IBM Global Business Services, Rajeev Palanki from IBM Java Technology Center, and Suparana Bhattacharya ...
doi:10.1007/978-3-642-31875-7_41
fatcat:yqtx2djjojax3midusj3puuasq
rCanary: Detecting Memory Leaks Across Semi-automated Memory Management Boundary in Rust
[article]
2023
arXiv
pre-print
It adopts a precise encoder to abstract data with heap allocation and formalizes a refined leak-free memory model based on Boolean satisfiability. rCanary is implemented as an external component of Cargo ...
In this paper, we present rCanary, a static, non-intrusive, and fully automated model checker to detect leaks across the semi-automated boundary. ...
Also, the full-sparse valueflow analysis [25, 70, 71] monitors value flow and define-use chains via top-level and address-taken pointers to detect leaks. ...
arXiv:2308.04787v1
fatcat:tcw2aybeajgzfbw6v7kogkngxu
Systematic testing for resource leaks in Android applications
2013
2013 IEEE 24th International Symposium on Software Reliability Engineering (ISSRE)
These results provide motivation for future work on analysis, testing, and prevention of resource leaks in Android software. ...
Despite a large body of existing work on leak detection, testing for resource leaks remains a challenging problem. ...
National Science Foundation under grants CCF-1017204 and CCF-1319695, and by a Google Faculty Research Award. ...
doi:10.1109/issre.2013.6698894
dblp:conf/issre/YanYR13
fatcat:vt6a3hv3rjgr7dt2qavxlbyyxu
LeakBot: An Automated and Lightweight Tool for Diagnosing Memory Leaks in Large Java Applications
[chapter]
2003
Lecture Notes in Computer Science
Despite Java's automatic reclamation of memory, memory leaks remain an important problem. For example, we frequently encounter memory leaks that cause production servers to crash. ...
We present an automated, adaptive, and scalable tool for diagnosing memory leaks, called LeakBot. LeakBot incorporates three new techniques. ...
Acknowledgements We appreciate the assistance of Matthew Arnold, Jong-Deok Choi, and Harini Srinivasan at IBM T.J. Watson Research Center in the refinement of the presentation of this paper. ...
doi:10.1007/978-3-540-45070-2_16
fatcat:jeqogtwdpzcidgrxdueoqoriza
Memory and Resource Leak Defects and their Repairs in Java Projects
[article]
2018
arXiv
pre-print
The study proposes taxonomies for the leak types, for the defects causing them, and for the repair actions. ...
We find that manual code inspection and manual runtime detection are still the main methods for leak detection. ...
We performed an in-depth analysis on leak defects and their repairs providing taxonomies for leak type, leak detection, fault localization, root-causes, and repair actions. ...
arXiv:1810.00101v1
fatcat:jo3q3jwfhvhzzi5cxdym64cemq
Memory and resource leak defects and their repairs in Java projects
2019
Empirical Software Engineering
The study proposes taxonomies for the leak types, for the defects causing them, and for the repair actions. ...
We find that manual code inspection and manual runtime detection are still the main methods for leak detection. ...
We performed an in-depth analysis on leak defects and their repairs providing taxonomies for leak type, leak detection, fault localization, root-causes, and repair actions. ...
doi:10.1007/s10664-019-09731-8
fatcat:irjag2wsmbfmzogzgpy6apso4q
Practical memory checking with Dr. Memory
2011
International Symposium on Code Generation and Optimization (CGO 2011)
However, such tools are difficult to build, and because they must monitor all memory accesses by the application, they incur significant overhead. ...
Dedicated memory checking tools are invaluable for finding these errors. ...
BoundsChecker [11] monitors Windows heap library calls and detects memory leaks and unaddressable accesses. It does not detect uninitialized reads. ...
doi:10.1109/cgo.2011.5764689
dblp:conf/cgo/BrueningZ11
fatcat:eiduvwwc3vhuzkrk2qu64t3dwy
Generating sound and effective memory debuggers
2013
Proceedings of the 2013 international symposium on International symposium on memory management - ISMM '13
For each bug class, bug conditions and their root cause are specified declaratively, in First-order logic, using 1 to 4 predicates. ...
We present a new approach for constructing debuggers based on declarative specification of bug conditions and root causes, and automatic generation of debugger code. ...
Acknowledgments This research is supported by the National Science Foundation grants CCF-0963996 and CCF-1149632 to the University of California, Riverside. ...
doi:10.1145/2491894.2464159
dblp:conf/iwmm/WangNG13
fatcat:m7pbloduang7nj5hkg6zibbc34
Generating sound and effective memory debuggers
2013
SIGPLAN notices
For each bug class, bug conditions and their root cause are specified declaratively, in First-order logic, using 1 to 4 predicates. ...
We present a new approach for constructing debuggers based on declarative specification of bug conditions and root causes, and automatic generation of debugger code. ...
Acknowledgments This research is supported by the National Science Foundation grants CCF-0963996 and CCF-1149632 to the University of California, Riverside. ...
doi:10.1145/2555670.2464159
fatcat:m22ebmihlbhcxdrgktjujx2llm
Visualizing the Java heap to detect memory problems
2009
2009 5th IEEE International Workshop on Visualizing Software for Understanding and Analysis
We have developed a framework for extracting and building a model of the heap from a running Java system. ...
This paper describes the visualization strategy we use for interactively displaying the model and related information to achieve these goals. ...
Related Work Memory analysis and visualization tools have been available for some time. ...
doi:10.1109/vissof.2009.5336418
dblp:conf/vissoft/Reiss09
fatcat:4g7xfrsijbf7xn7mp6qsi3m2xm
An Automated Approach of Detection of Memory Leaks for Remote Server Controllers
2020
Emitter: International Journal of Engineering Technology
These processes with leaks are passed to the next stage where precise memory leak detection is done using the open source dynamic instrumentation tool Valgrind. ...
The system leverages an automated leak detection approach that invokes the leak detection process on encountering any severity in the system and generates a consolidated leak report. ...
Acknowledgements The authors would like to thank Dell Research and Development, and BMS College of Engineering Bangalore for providing the opportunity to carry out the work. ...
doi:10.24003/emitter.v8i2.550
fatcat:vdl5wdaornaofa4jbgowxsimie
« Previous
Showing results 1 — 15 out of 1,137 results