Formal Analysis of Memory Leak Defects

Article Preview

Abstract:

Memory leak defects of software often reduce the running capability and may lead the system breakdown. This paper analyzes pointers status and their conversion function and presents the formal description of memory leak defects. On the basis of this, it analyzes various relevant operation and representation of this kind of defects.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3501-3504

Citation:

Online since:

September 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] R. Hastings and B. Joyce. Purify: Fast detection of memory leaks and access errors[C]. Proceedings of the Winter USENIX Conference, 1999. Page125-136.

Google Scholar

[2] T. M. Austin, S. E. Breach, G. S. Sohi. Efficient detection of all pointer and array access errors[C]. USA: ACM special interest Group on programming languages, 1994. Page 290-301.

DOI: 10.1145/773473.178446

Google Scholar

[3] S. Cherem, L. Princehouse, R. Rugina. Practical memory leak detection using guarded value-flow analysis[C] /Proc of ACM SIGPLAN Conference on Programming Language Design and Implementation. New York: ACM Press, 2007: 480-491.

DOI: 10.1145/1250734.1250789

Google Scholar

[4] Y. Jung, K. Yi. Practical memory leak detector based on parameterized procedural summaries[C], Proc of International Symposium on Foundations of Software Engineering. New York: ACM Press, 2008: 131-140.

DOI: 10.1145/1375634.1375653

Google Scholar

[5] Z. X. Xu, J. Zhang. Path and context sensitive inter-procedural memory leak detection[C], Proc of the 8th International Conference on Quality Software. 2008: 412-420.

DOI: 10.1109/qsic.2008.12

Google Scholar

[6] T. Sai, K. Vaidyanathan, K. Gross. Low-overhead run-time memory leak detection and recovery/ Proceedings of the PRDC' 06. River side, USA, 2006: 329-340.

DOI: 10.1109/prdc.2006.42

Google Scholar