메뉴 건너뛰기




Volumn , Issue , 2006, Pages 219-228

HeapMD: Identifying heap-based bugs using anomaly detection

Author keywords

Anomaly detection; Bugs; Debugging; Heap; Metrics

Indexed keywords

ANOMALY DETECTION; BUGS; METRICS;

EID: 34547417097     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1168857.1168885     Document Type: Conference Paper
Times cited : (19)

References (31)
  • 1
    • 0034837177 scopus 로고    scopus 로고
    • A framework for reducing the cost of instrumented code
    • May, ACM, pp
    • ARNOLD, M., AND RYDER, B. G. A framework for reducing the cost of instrumented code. In Proc. PLDI (May 2001), ACM, pp. 168-179.
    • (2001) Proc. PLDI , pp. 168-179
    • ARNOLD, M.1    RYDER, B.G.2
  • 2
    • 0033688092 scopus 로고    scopus 로고
    • A static analyzer for finding dynamic programming errors
    • BUSH, W., PINCUS, J. D., AND SIELAFF, D. J. A static analyzer for finding dynamic programming errors. Software-Practice and Experience 30, 7 (2000), 775-802.
    • (2000) Software-Practice and Experience , vol.30 , Issue.7 , pp. 775-802
    • BUSH, W.1    PINCUS, J.D.2    SIELAFF, D.J.3
  • 3
    • 12844277166 scopus 로고    scopus 로고
    • Low-overhead memory leak detection using adaptive statistical profiling
    • October, ACM, pp
    • CHILIMBI, T. M., AND HAUSWIRTH, M. Low-overhead memory leak detection using adaptive statistical profiling. In Proc. ASPLOS (October 2004), ACM, pp. 156-164.
    • (2004) Proc. ASPLOS , pp. 156-164
    • CHILIMBI, T.M.1    HAUSWIRTH, M.2
  • 4
    • 0036039949 scopus 로고    scopus 로고
    • Role-based exploration of object-oriented programs
    • May, IEEE/ACM, pp
    • DEMSKY, B., AND RINARDI M. Role-based exploration of object-oriented programs. In Proc. ICSE (May 2002), IEEE/ACM, pp. 313-334.
    • (2002) Proc. ICSE , pp. 313-334
    • DEMSKY, B.1    RINARDI, M.2
  • 5
    • 1442288535 scopus 로고    scopus 로고
    • Automatic detection and repair of errors in data structures
    • October, ACM, pp
    • DEMSKY, B., AND RINARD, M. Automatic detection and repair of errors in data structures. In Proc. OOPSLA (October 2003), ACM, pp. 78-95.
    • (2003) Proc. OOPSLA , pp. 78-95
    • DEMSKY, B.1    RINARD, M.2
  • 6
    • 0038716440 scopus 로고    scopus 로고
    • Predicting whole-program locality with reuse distance analysis
    • June, ACM, pp
    • DING, C., AND ZHONG, Y. Predicting whole-program locality with reuse distance analysis. In Proc. PLDI (June 2003), ACM, pp. 245-257.
    • (2003) Proc. PLDI , pp. 245-257
    • DING, C.1    ZHONG, Y.2
  • 7
    • 0004349103 scopus 로고    scopus 로고
    • Vulcan: Binary transformation in. a distributed environment
    • Tech. Rep. 2001-50, Microsoft Research, April
    • EDWARDS, A., SRIVASTAVA, A., AND VO, H. Vulcan: Binary transformation in. a distributed environment. Tech. Rep. 2001-50, Microsoft Research, April 2001.
    • (2001)
    • EDWARDS, A.1    SRIVASTAVA, A.2    VO, H.3
  • 8
    • 33846171541 scopus 로고    scopus 로고
    • Discovering Likely Program Invariants. PhD thesis, University of Washington, Seattle, WA, August
    • ERNST, M. D. Dynamically Discovering Likely Program Invariants. PhD thesis, University of Washington, Seattle, WA, August 2000.
    • (2000) Dynamically
    • ERNST, M.D.1
  • 9
    • 0029719687 scopus 로고    scopus 로고
    • GHIYA, R., AND HENDREN, L. Is it a Tree, a DAG or a Cyclic Graph? A shape analysis for heap-directed pointers in C. In Proc. POPL (January .1996), ACM, pp. 1-15.
    • GHIYA, R., AND HENDREN, L. Is it a Tree, a DAG or a Cyclic Graph? A shape analysis for heap-directed pointers in C. In Proc. POPL (January .1996), ACM, pp. 1-15.
  • 10
    • 29144444097 scopus 로고    scopus 로고
    • Region-based shape analysis with tracked locations
    • January, ACM, pp
    • HACKETT, B., AND RUGINA, R. Region-based shape analysis with tracked locations. In Proc. POPL (January 2005), ACM, pp. 310-323.
    • (2005) Proc. POPL , pp. 310-323
    • HACKETT, B.1    RUGINA, R.2
  • 11
    • 0036038345 scopus 로고    scopus 로고
    • Tracking down software bugs using automatic anomaly detection
    • May, IEEE/ACM, pp
    • HANGAL, S., AND LAM, M. S. Tracking down software bugs using automatic anomaly detection. In Proc. ICSE (May 2002), IEEE/ACM, pp. 291-301.
    • (2002) Proc. ICSE , pp. 291-301
    • HANGAL, S.1    LAM, M.S.2
  • 12
    • 0000596666 scopus 로고
    • Purify: Fast detection of memory leaks and access errors
    • January
    • HASTINGS, R., AND JOYCE, B. Purify: Fast detection of memory leaks and access errors. In Winter USENIX Conference (January 1992).
    • (1992) Winter USENIX Conference
    • HASTINGS, R.1    JOYCE, B.2
  • 14
    • 1442264406 scopus 로고    scopus 로고
    • Understanding the connectivity of heap objects
    • June, ACM, pp
    • HIRZEL, M., HENKEL, J., DIWAN, A., AND HIND, M. Understanding the connectivity of heap objects. In Proc. ISMM (June 2002), ACM, pp. 143-156.
    • (2002) Proc. ISMM , pp. 143-156
    • HIRZEL, M.1    HENKEL, J.2    DIWAN, A.3    HIND, M.4
  • 15
    • 20344404753 scopus 로고    scopus 로고
    • Correlation exploitation in error ranking
    • November, ACM, pp
    • KREMENEK, T., ASHCRAFT, K., YANG, J., AND ENGLER, D. Correlation exploitation in error ranking. In Proc. SIGSOFT FSE (November 2004), ACM, pp. 83-93.
    • (2004) Proc. SIGSOFT FSE , pp. 83-93
    • KREMENEK, T.1    ASHCRAFT, K.2    YANG, J.3    ENGLER, D.4
  • 16
    • 35248882461 scopus 로고    scopus 로고
    • KREMENEK, T., AND ENGLER, D. Z-Ranking: Using statistical analysis to counter the impact of static analysis approximations. In Proc. Intl. Static Analysis Symp. (SAS) (June 2003), pp. 295-315.
    • KREMENEK, T., AND ENGLER, D. Z-Ranking: Using statistical analysis to counter the impact of static analysis approximations. In Proc. Intl. Static Analysis Symp. (SAS) (June 2003), pp. 295-315.
  • 17
    • 84910009447 scopus 로고    scopus 로고
    • Cp-miner: A tool for finding copy-paste and related bugs in operating system code
    • Dec., ACM/USENIX, pp
    • LI, Z., LU, S., MYAGMAR, S., AND ZHOU, Y. Cp-miner: A tool for finding copy-paste and related bugs in operating system code. In Proc. OSDI (Dec. 2004), ACM/USENIX, pp. 289-302.
    • (2004) Proc. OSDI , pp. 289-302
    • LI, Z.1    LU, S.2    MYAGMAR, S.3    ZHOU, Y.4
  • 18
    • 0038716503 scopus 로고    scopus 로고
    • Bug isolation via remote program, sampling
    • June, ACM, pp
    • LIBLIT, B., AIKEN, A., ZHENG, A. X., AND JORDAN, M. I. Bug isolation via remote program, sampling. In Proc. PLDI (June 2003), ACM, pp. 141-154.
    • (2003) Proc. PLDI , pp. 141-154
    • LIBLIT, B.1    AIKEN, A.2    ZHENG, A.X.3    JORDAN, M.I.4
  • 20
    • 33846494375 scopus 로고    scopus 로고
    • Verifying properties of well-founed linked lists
    • Jan., ACM
    • QADEER, S., AND LAHIRI, S. Verifying properties of well-founed linked lists. In Proc. POPL (Jan. 2006), ACM.
    • (2006) Proc. POPL
    • QADEER, S.1    LAHIRI, S.2
  • 21
    • 84885578759 scopus 로고    scopus 로고
    • Treating bugs as allergies - a safe method to survive software failures
    • Oct, ACM, pp
    • QIN, F., TUCEK, J., SUNDARESAN, J., AND ZHOU, Y. Rx: Treating bugs as allergies - a safe method to survive software failures. In Proc. SOSP (Oct 2005), ACM, pp. 235-248.
    • (2005) Proc. SOSP , pp. 235-248
    • QIN, F.1    TUCEK, J.2    SUNDARESAN, J.3    ZHOU, Y.R.4
  • 22
    • 84906487819 scopus 로고    scopus 로고
    • Enhancing server availability and security through failure-oblivious computing
    • December
    • RLNARD, M., CADAR, C., DUMITRAN, D., ROY, D., LEU, T., AND BEEBEE, W. Enhancing server availability and security through failure-oblivious computing. In Proc. OSDI (December 2004), pp. 303-316.
    • (2004) Proc. OSDI , pp. 303-316
    • RLNARD, M.1    CADAR, C.2    DUMITRAN, D.3    ROY, D.4    LEU, T.5    BEEBEE, W.6
  • 23
    • 0036040711 scopus 로고    scopus 로고
    • An efficient profile-analysis framework for data-layout optimizations
    • January, ACM, pp
    • RUBIN, S., BODIK, R., AND CHILIMBI, T. M. An efficient profile-analysis framework for data-layout optimizations. In Proc. POPL (January 2002), ACM, pp. 140-153.
    • (2002) Proc. POPL , pp. 140-153
    • RUBIN, S.1    BODIK, R.2    CHILIMBI, T.M.3
  • 24
    • 0039488517 scopus 로고    scopus 로고
    • Parametric shape analysis via 3-valued logic
    • May
    • SAGIV, M., REPS, T. W., AND WILHELM, R. Parametric shape analysis via 3-valued logic. ACM TOPLAS 24, 3 (May 2002), 217-298.
    • (2002) ACM TOPLAS , vol.24 , Issue.3 , pp. 217-298
    • SAGIV, M.1    REPS, T.W.2    WILHELM, R.3
  • 25
    • 0034829697 scopus 로고    scopus 로고
    • A fast automaton-based method for detecting anomalous program behaviors
    • May, IEEE, pp
    • SEKAR, R., BENDRE, M., DHURJATI, D., AND BOLLINENI, P. A fast automaton-based method for detecting anomalous program behaviors. In Symp. on Security and Privacy (May 2001), IEEE, pp. 144-155.
    • (2001) Symp. on Security and Privacy , pp. 144-155
    • SEKAR, R.1    BENDRE, M.2    DHURJATI, D.3    BOLLINENI, P.4
  • 26
    • 12844275862 scopus 로고    scopus 로고
    • Locality phase prediction
    • October, ACM, pp
    • SHEN, X., ZHONG, Y., AND DING, C. Locality phase prediction. In Proc. ASPLOS (October 2004), ACM, pp. 165-176.
    • (2004) Proc. ASPLOS , pp. 165-176
    • SHEN, X.1    ZHONG, Y.2    DING, C.3
  • 27
    • 0036953769 scopus 로고    scopus 로고
    • Automatically characterizing large scale program, behaviour
    • October, ACM, pp
    • SHERWOOD, T., PERELMAN, E., HAMERLY, G., AND CALDER, B. Automatically characterizing large scale program, behaviour. In Proc. ASPLOS (October 2002), ACM, pp. 45-57.
    • (2002) Proc. ASPLOS , pp. 45-57
    • SHERWOOD, T.1    PERELMAN, E.2    HAMERLY, G.3    CALDER, B.4
  • 28
    • 1342298848 scopus 로고    scopus 로고
    • Phase tracking and prediction
    • June
    • SHERWOOD, T., SAIR, S., AND CALDER, B. Phase tracking and prediction. In Proc. ISCA (June 2003), pp. 288-299.
    • (2003) Proc. ISCA , pp. 288-299
    • SHERWOOD, T.1    SAIR, S.2    CALDER, B.3
  • 29
    • 0034836394 scopus 로고    scopus 로고
    • Intrusion detection via static analysis
    • May, IEEE, pp
    • WAGNER, D., AND DEAN, D. Intrusion detection via static analysis. In Symp. on Security and Privacy (May 2001), IEEE, pp. 156-169.
    • (2001) Symp. on Security and Privacy , pp. 156-169
    • WAGNER, D.1    DEAN, D.2
  • 30
    • 8344280849 scopus 로고    scopus 로고
    • Verifying safety properties using separation, and heterogenous abstractions
    • June, ACM, pp
    • YAHAV, E., AND RAMALINGAM, G. Verifying safety properties using separation, and heterogenous abstractions. In Proc. PLDI (June 2004), ACM, pp. 25-34.
    • (2004) Proc. PLDI , pp. 25-34
    • YAHAV, E.1    RAMALINGAM, G.2
  • 31
    • 21644447484 scopus 로고    scopus 로고
    • AccMon: Automatically detecting memory-related bugs via program counter-based invariants
    • December, IEEE/ACM, pp
    • ZHOU, P., LIU, W., LONG, F., LU, S., QIN, F., ZHOU, Y., MIDKIFF, S., AND TORRELLAS, J. AccMon: Automatically detecting memory-related bugs via program counter-based invariants. In Proc. MICRO (December 2004), IEEE/ACM, pp. 269-280.
    • (2004) Proc. MICRO , pp. 269-280
    • ZHOU, P.1    LIU, W.2    LONG, F.3    LU, S.4    QIN, F.5    ZHOU, Y.6    MIDKIFF, S.7    TORRELLAS, J.8


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.