Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








1,137 Hits in 6.0 sec

A Study on Abnormal Behaviour in Mobile Application

Naqliyah Bt Zainuddin, Mohd Faizal Bin Abdollah, Robiah Bt Yusof, Shahrin Bin Sahib
2014 OALib  
Current analysis and detection of abnormal applications behavior are still not comprehensive enough where behavior under user visible failure category such as crash, "stopped unexpectedly" and "not responding  ...  An incorrect or insufficient implementation of application lifecycle, memory related issues and malicious application might cause an unexpected behavior of the application such as bad usability, not responding  ...  A specific tool for memory analysis is Memory Analyzer Tool (MAT).  ... 
doi:10.4236/oalib.1101229 fatcat:s2moxna77ndmrdsmuruz5jff6e

Do Memories Haunt You? An Automated Black Box Testing Approach for Detecting Memory Leaks in Android Apps

Domenico Amalfitano, Vincenzo Riccio, Porfirio Tramontana, Anna Rita Fasolino
2020 IEEE Access  
The study also illustrates how memory leak causes can be detected with the support of the information provided by the FunesDroid tool.  ...  In order to detect and characterize these memory leaks, we present FunesDroid, a toolsupported black box technique for the automatic detection of memory leaks tied to the Activity Lifecycle in Android  ...  Sellitto and G. D'Alterio for their contributions to the prototyping of the FunesDroid tool and to the analysis of some of the found memory leaks.  ... 
doi:10.1109/access.2020.2966522 fatcat:kloyjf6lhnhplfmzktz5wtfhca

A Detection and Measurement Approach for Memory Leaked Objects in Java Programs

Qiao YU, Shujuan JIANG, Yingqi LIU
2015 IEICE transactions on information and systems  
The experimental results show that our approach is able to detect and measure memory leaked objects efficiently. key words: memory leak, heap information, leaked objects, memory leaking confidence  ...  This paper presents a dynamic approach for detecting and measuring memory leaked objects in Java programs.  ...  Acknowledgments This work was supported partly by the National Natural Science Foundation of China [No.60970032] and the 333 Project.  ... 
doi:10.1587/transinf.2014edp7320 fatcat:6q7nuzvv3jcrdmahvh6gdmij5a

DoubleTake: Fast and Precise Error Detection via Evidence-Based Dynamic Analysis [article]

Tongping Liu, Charlie Curtsinger, Emery D. Berger
2016 arXiv   pre-print
We demonstrate DoubleTake's generality and efficiency by building dynamic analyses that find buffer overflows, memory use-after-free errors, and memory leaks.  ...  The key insight of evidence-based dynamic analysis is that for a class of errors, it is possible to ensure that evidence that they happened at some point in the past remains for later detection.  ...  We thank Kostya Serebryany for his assistance with our evaluation of Ad-dressSanitizer, and Qiang Zeng, Dinghao Wu and Peng Liu for providing the test cases used in their Cruiser paper.  ... 
arXiv:1601.07962v1 fatcat:ljbiukfwffbgraj5px43tfj4rq

Performance Analysis and Problem Determination in SOA Environments [chapter]

Vijay Mann, Venkateswara R. Madduri, Srividya Shamaiah
2012 Lecture Notes in Computer Science  
We note that, in practice Java language and the associated J2EE stack remains one of the most popular runtime environment for implementing SOA.  ...  However, we make the case that at least part of the performance analysis process can be automated and offered as a service.  ...  We would like to thank Ravi Kothari and Manish Gupta from IBM Research -India, Ashish Agrawal from IBM Global Business Services, Rajeev Palanki from IBM Java Technology Center, and Suparana Bhattacharya  ... 
doi:10.1007/978-3-642-31875-7_41 fatcat:yqtx2djjojax3midusj3puuasq

rCanary: Detecting Memory Leaks Across Semi-automated Memory Management Boundary in Rust [article]

Mohan Cui, Suran Sun, Hui Xu, Yangfan Zhou
2023 arXiv   pre-print
It adopts a precise encoder to abstract data with heap allocation and formalizes a refined leak-free memory model based on Boolean satisfiability. rCanary is implemented as an external component of Cargo  ...  In this paper, we present rCanary, a static, non-intrusive, and fully automated model checker to detect leaks across the semi-automated boundary.  ...  Also, the full-sparse valueflow analysis [25, 70, 71] monitors value flow and define-use chains via top-level and address-taken pointers to detect leaks.  ... 
arXiv:2308.04787v1 fatcat:tcw2aybeajgzfbw6v7kogkngxu

Systematic testing for resource leaks in Android applications

Dacong Yan, Shengqian Yang, Atanas Rountev
2013 2013 IEEE 24th International Symposium on Software Reliability Engineering (ISSRE)  
These results provide motivation for future work on analysis, testing, and prevention of resource leaks in Android software.  ...  Despite a large body of existing work on leak detection, testing for resource leaks remains a challenging problem.  ...  National Science Foundation under grants CCF-1017204 and CCF-1319695, and by a Google Faculty Research Award.  ... 
doi:10.1109/issre.2013.6698894 dblp:conf/issre/YanYR13 fatcat:vt6a3hv3rjgr7dt2qavxlbyyxu

LeakBot: An Automated and Lightweight Tool for Diagnosing Memory Leaks in Large Java Applications [chapter]

Nick Mitchell, Gary Sevitsky
2003 Lecture Notes in Computer Science  
Despite Java's automatic reclamation of memory, memory leaks remain an important problem. For example, we frequently encounter memory leaks that cause production servers to crash.  ...  We present an automated, adaptive, and scalable tool for diagnosing memory leaks, called LeakBot. LeakBot incorporates three new techniques.  ...  Acknowledgements We appreciate the assistance of Matthew Arnold, Jong-Deok Choi, and Harini Srinivasan at IBM T.J. Watson Research Center in the refinement of the presentation of this paper.  ... 
doi:10.1007/978-3-540-45070-2_16 fatcat:jeqogtwdpzcidgrxdueoqoriza

Memory and Resource Leak Defects and their Repairs in Java Projects [article]

Mohammadreza Ghanavati, Diego Costa, Janos Seboek, David Lo, Artur Andrzejak
2018 arXiv   pre-print
The study proposes taxonomies for the leak types, for the defects causing them, and for the repair actions.  ...  We find that manual code inspection and manual runtime detection are still the main methods for leak detection.  ...  We performed an in-depth analysis on leak defects and their repairs providing taxonomies for leak type, leak detection, fault localization, root-causes, and repair actions.  ... 
arXiv:1810.00101v1 fatcat:jo3q3jwfhvhzzi5cxdym64cemq

Memory and resource leak defects and their repairs in Java projects

Mohammadreza Ghanavati, Diego Costa, Janos Seboek, David Lo, Artur Andrzejak
2019 Empirical Software Engineering  
The study proposes taxonomies for the leak types, for the defects causing them, and for the repair actions.  ...  We find that manual code inspection and manual runtime detection are still the main methods for leak detection.  ...  We performed an in-depth analysis on leak defects and their repairs providing taxonomies for leak type, leak detection, fault localization, root-causes, and repair actions.  ... 
doi:10.1007/s10664-019-09731-8 fatcat:irjag2wsmbfmzogzgpy6apso4q

Practical memory checking with Dr. Memory

Derek Bruening, Qin Zhao
2011 International Symposium on Code Generation and Optimization (CGO 2011)  
However, such tools are difficult to build, and because they must monitor all memory accesses by the application, they incur significant overhead.  ...  Dedicated memory checking tools are invaluable for finding these errors.  ...  BoundsChecker [11] monitors Windows heap library calls and detects memory leaks and unaddressable accesses. It does not detect uninitialized reads.  ... 
doi:10.1109/cgo.2011.5764689 dblp:conf/cgo/BrueningZ11 fatcat:eiduvwwc3vhuzkrk2qu64t3dwy

Generating sound and effective memory debuggers

Yan Wang, Iulian Neamtiu, Rajiv Gupta
2013 Proceedings of the 2013 international symposium on International symposium on memory management - ISMM '13  
For each bug class, bug conditions and their root cause are specified declaratively, in First-order logic, using 1 to 4 predicates.  ...  We present a new approach for constructing debuggers based on declarative specification of bug conditions and root causes, and automatic generation of debugger code.  ...  Acknowledgments This research is supported by the National Science Foundation grants CCF-0963996 and CCF-1149632 to the University of California, Riverside.  ... 
doi:10.1145/2491894.2464159 dblp:conf/iwmm/WangNG13 fatcat:m7pbloduang7nj5hkg6zibbc34

Generating sound and effective memory debuggers

Yan Wang, Iulian Neamtiu, Rajiv Gupta
2013 SIGPLAN notices  
For each bug class, bug conditions and their root cause are specified declaratively, in First-order logic, using 1 to 4 predicates.  ...  We present a new approach for constructing debuggers based on declarative specification of bug conditions and root causes, and automatic generation of debugger code.  ...  Acknowledgments This research is supported by the National Science Foundation grants CCF-0963996 and CCF-1149632 to the University of California, Riverside.  ... 
doi:10.1145/2555670.2464159 fatcat:m22ebmihlbhcxdrgktjujx2llm

Visualizing the Java heap to detect memory problems

Steven P. Reiss
2009 2009 5th IEEE International Workshop on Visualizing Software for Understanding and Analysis  
We have developed a framework for extracting and building a model of the heap from a running Java system.  ...  This paper describes the visualization strategy we use for interactively displaying the model and related information to achieve these goals.  ...  Related Work Memory analysis and visualization tools have been available for some time.  ... 
doi:10.1109/vissof.2009.5336418 dblp:conf/vissoft/Reiss09 fatcat:4g7xfrsijbf7xn7mp6qsi3m2xm

An Automated Approach of Detection of Memory Leaks for Remote Server Controllers

Bhavana D, Veena M B, Santosh Kumar Sahu
2020 Emitter: International Journal of Engineering Technology  
These processes with leaks are passed to the next stage where precise memory leak detection is done using the open source dynamic instrumentation tool Valgrind.  ...  The system leverages an automated leak detection approach that invokes the leak detection process on encountering any severity in the system and generates a consolidated leak report.  ...  Acknowledgements The authors would like to thank Dell Research and Development, and BMS College of Engineering Bangalore for providing the opportunity to carry out the work.  ... 
doi:10.24003/emitter.v8i2.550 fatcat:vdl5wdaornaofa4jbgowxsimie
« Previous Showing results 1 — 15 out of 1,137 results