메뉴 건너뛰기




Volumn , Issue 1, 2014, Pages 814-824

Detecting memory leaks through introspective dynamic behavior modelling using machine learning

Author keywords

Machine learning; Memory leak detection; Runtime analysis

Indexed keywords

ARTIFICIAL INTELLIGENCE; LEAK DETECTION; SOFTWARE ENGINEERING;

EID: 84994156602     PISSN: 02705257     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2568225.2568307     Document Type: Conference Paper
Times cited : (26)

References (35)
  • 1
    • 84994194490 scopus 로고    scopus 로고
    • Bash patch report
    • Bash patch report. http: //ftp. gnu.org/gnu/bash/ bash-4. 0-patches/bash40-033.
  • 2
    • 84994190005 scopus 로고    scopus 로고
    • lig.httpd-y light
    • lighttpd-y light. http: //www. lighttpd. net/.
  • 3
    • 84994194493 scopus 로고    scopus 로고
    • lig,httpd issue tracker
    • lighttpd issue tracker. http: //redmine. lighttpd. net/issues/1775.
  • 5
    • 3142723444 scopus 로고    scopus 로고
    • Space eficient conservative garbage collection
    • April 2004
    • H. J. Boehm. Space eficient conservative garbage collection. SIGPLAN Not., 39: 490-501, April 2004.
    • SIGPLAN Not , vol.39 , pp. 490-501
    • Boehm, H.J.1
  • 8
    • 34547518835 scopus 로고    scopus 로고
    • Bell: Bit-encoding online memory leak detection
    • New York, USA
    • M. D. Bond and K. S. McKinley. Bell: bit-encoding online memory leak detection. In Proc. of the 12th ASPLOS, New York, USA, 2006.
    • (2006) Proc. of the 12th ASPLOS
    • Bond, M.D.1    McKinley, K.S.2
  • 9
    • 79957490764 scopus 로고    scopus 로고
    • Practical memory checking with dr.memory
    • D. Bruening and Q. Zhao. Practical memory checking with dr. memory. In Proc. of the 9th CGO, pages 213-223, 2011.
    • (2011) Proc. of the 9th CGO , pp. 213-223
    • Bruening, D.1    Zhao, Q.2
  • 10
    • 27144489164 scopus 로고    scopus 로고
    • A tutorial on support vector machines for pattern recognition
    • C. J. Burges. A tutorial on support vector machines for pattern recognition. Data mining and knowledge discovery, 2 (2): 121-167, 1998.
    • (1998) Data Mining and Knowledge Discovery , vol.2 , Issue.2 , pp. 121-167
    • Burges, C.J.1
  • 14
    • 12844277166 scopus 로고    scopus 로고
    • Low-overhead memory leak detection using adaptive statistical pro-ling
    • T. M. Chilimbi and M. Hauswirth. Low-overhead memory leak detection using adaptive statistical pro-ling. In Proc. of 11th ASPLOS'04.
    • Proc. of 11th ASPLOS'04
    • Chilimbi, T.M.1    Hauswirth, M.2
  • 15
    • 77954701915 scopus 로고    scopus 로고
    • Leakpoint: Pinpointing the causes of memory leaks
    • New York, NY, USA
    • J. Clause and A. Orso. Leakpoint: pinpointing the causes of memory leaks. In Proc. of the 32nd ICSE, New York, NY, USA, 2010.
    • (2010) Proc. of the 32nd ICSE
    • Clause, J.1    Orso, A.2
  • 16
    • 34249753618 scopus 로고
    • Support-vector networks
    • C. Cortes and V. Vapnik. Support-vector networks. Machine Learning, 20 (3): 273-297, 1995.
    • (1995) Machine Learning , vol.20 , Issue.3 , pp. 273-297
    • Cortes, C.1    Vapnik, V.2
  • 18
    • 84994118985 scopus 로고    scopus 로고
    • A practical ow-and context-sensitive c/c++ memory leak detector
    • D. L. Heine and M. S. Lam. A practical ow-and context-sensitive c/c++ memory leak detector. In Proc. of the 23rd PLDI, 2003.
    • (2003) Proc.Of the 23rd PLDI
    • Heine, D.L.1    Lam, M.S.2
  • 24
    • 57349198244 scopus 로고    scopus 로고
    • Practical memory leak detector based on parameterized procedural summaries
    • Y. Jung and K. Yi. Practical memory leak detector based on parameterized procedural summaries. In Proc. of the 7th ISMM, 2008.
    • (2008) Proc. of the 7th ISMM
    • Jung, Y.1    Yi, K.2
  • 28
    • 28444490333 scopus 로고    scopus 로고
    • Safemem: Exploiting ecc-memory for detecting memory leaks and memory corruption during production runs
    • F. Qin, S. Lu, and Y. Zhou. Safemem: Exploiting ecc-memory for detecting memory leaks and memory corruption during production runs. In Proc. of the 11th HPCA, 2005.
    • (2005) Proc. of the 11th HPCA
    • Qin, F.1    Lu, S.2    Zhou, Y.3
  • 33
    • 32344440613 scopus 로고    scopus 로고
    • Context-and path-sensitive memory leak detection
    • ACM Press
    • Y. Xie and A. Aiken. Context-and path-sensitive memory leak detection. In Proc. of ESEC/FSE 2005. ACM Press, 2005.
    • (2005) Proc. of ESEC/FSE 2005
    • Xie, Y.1    Aiken, A.2
  • 34
    • 79959892905 scopus 로고    scopus 로고
    • Leakchaser: Helping programmers narrow down causes of memory leaks
    • G. Xu, M. D. Bond, F. Qin, and A. Rountev. Leakchaser: helping programmers narrow down causes of memory leaks. In Proc. of the 32nd PLDI, 2011.
    • (2011) Proc. of the 32nd PLDI
    • Xu, G.1    Bond, M.D.2    Qin, F.3    Rountev, A.4
  • 35
    • 67650714764 scopus 로고    scopus 로고
    • Precise memory leak detection for Java software using container pro-ling
    • G. Xu and A. Rountev. Precise memory leak detection for Java software using container pro-ling. In Proc. of the 30th ICSE, 2008.
    • (2008) Proc. of the 30th ICSE
    • Xu, G.1    Rountev, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.