Memory leaks are caused by software programs that prevent the reclamation of memory that is no longer in use. They can cause significant slowdowns, exhaustion of available storage space and, eventually, application crashes. Detecting mem-ory leaks is challenging because real-world applications are built on multiple layers of software frameworks, making it difficult for a developer to know whether observed references to objects are legitimate or the cause of a leak. We present a graph mining solution to this problem wherein we ana-lyze heap dumps to automatically identify subgraphs which could represent potential memory leak sources. Although heap dumps are commonly analyzed in existing heap pro-filing tools, our work is the first to apply a...
Heap layout manipulation is integral to exploiting heapbased memory corruption vulnerabilities. In t...
Memory leaks are known to be a major cause of reliability and performance issues in software. This p...
The context for this paper is functional computation by graph reduction. Our overall aim is more eff...
Programmers increasingly rely on managed languages (e.g. Java and C#) to develop applications faster...
Abstract. We present a novel leak detection algorithm. To prove the absence of a memory leak, the al...
A memory leak in a Java program occurs when object ref-erences that are no longer needed are unneces...
Abstract—Memory graphs are very useful in understanding the behavior of programs that use dynamicall...
Despite all the benefits of garbage collection, memory leaks remain a problem for Java programs. A m...
Code analysis has discovered that memory leaks are common in the C programming language. In the lite...
We present the design, implementation, and evaluation of HeapMD, a dynamic analysis tool that finds ...
Memory leaks are recognized to be one of the major causes of memory exhaustion problems in complex s...
We introduce object ownership profiling, a technique for finding and fixing memory leaks in object-o...
The dual heap virtual implementation provided a new base for memory organization such that the heap ...
Memory leaks are recognized to be one of the major causes of memory exhaustion problems in complex s...
This work addresses the problem of discovering bugs in software development. We investigate the util...
Heap layout manipulation is integral to exploiting heapbased memory corruption vulnerabilities. In t...
Memory leaks are known to be a major cause of reliability and performance issues in software. This p...
The context for this paper is functional computation by graph reduction. Our overall aim is more eff...
Programmers increasingly rely on managed languages (e.g. Java and C#) to develop applications faster...
Abstract. We present a novel leak detection algorithm. To prove the absence of a memory leak, the al...
A memory leak in a Java program occurs when object ref-erences that are no longer needed are unneces...
Abstract—Memory graphs are very useful in understanding the behavior of programs that use dynamicall...
Despite all the benefits of garbage collection, memory leaks remain a problem for Java programs. A m...
Code analysis has discovered that memory leaks are common in the C programming language. In the lite...
We present the design, implementation, and evaluation of HeapMD, a dynamic analysis tool that finds ...
Memory leaks are recognized to be one of the major causes of memory exhaustion problems in complex s...
We introduce object ownership profiling, a technique for finding and fixing memory leaks in object-o...
The dual heap virtual implementation provided a new base for memory organization such that the heap ...
Memory leaks are recognized to be one of the major causes of memory exhaustion problems in complex s...
This work addresses the problem of discovering bugs in software development. We investigate the util...
Heap layout manipulation is integral to exploiting heapbased memory corruption vulnerabilities. In t...
Memory leaks are known to be a major cause of reliability and performance issues in software. This p...
The context for this paper is functional computation by graph reduction. Our overall aim is more eff...