© 2016 ACM.C is the dominant programming language for developing embedded software, operating systems, and device drivers. Unlike programs written in managed languages like Java, C programs rely on explicit memory management and are prone to memory leaks. Existing (static or dynamic) detectors only report leaks, but fixing them often requires considerable manual effort by inspecting a list of reported true and false alarms. How to develop on-demand lightweight techniques for automated leak fixing without introducing new memory errors remains challenging. In this paper, we introduce AUTOFIX, a fully automated leak-fixing approach for C programs by combining static and dynamic program analysis. Given a leaky allocation site reported by a stat...
Programs written in C and C++ are susceptible to memory errors, including buffer overflows and dangl...
Static analysis of programs in weakly typed languages such as C and C++ generally is not guaranteed ...
We describe a new technique for finding potential buffer overrun vulnerabilities in security-critica...
Code analysis has discovered that memory leaks are common in the C programming language. In the lite...
Abstract—Automatic bug fixing has become a promising direc-tion for reducing manual effort in debugg...
We introduce a static detector, Saber, for detecting memory leaks in C programs. Leveraging recent a...
Abstract. We present a novel leak detection algorithm. To prove the absence of a memory leak, the al...
Automatic bug fixing has become a promising direction over manual fixing of bugs. In this work, we ...
Memory errors in C programs are the root causes of many defects and vulnerabilitiesin software engin...
Deallocation of dynamically allocated memory belongs to the responsibil- ity of programmers in the ...
We present and evaluate a new memory management technique foreliminating memory leaks in programs wi...
Abstract — We present and evaluate a new memory man-agement technique for eliminating memory leaks i...
Memory leaks are a continuing problem in the software developed with programming languages, such as ...
Static detection of memory leaks in a managed language such as Java is attractive because it does no...
Finding errors in software is a difficult problem: millions of dollars are spent in testing and debu...
Programs written in C and C++ are susceptible to memory errors, including buffer overflows and dangl...
Static analysis of programs in weakly typed languages such as C and C++ generally is not guaranteed ...
We describe a new technique for finding potential buffer overrun vulnerabilities in security-critica...
Code analysis has discovered that memory leaks are common in the C programming language. In the lite...
Abstract—Automatic bug fixing has become a promising direc-tion for reducing manual effort in debugg...
We introduce a static detector, Saber, for detecting memory leaks in C programs. Leveraging recent a...
Abstract. We present a novel leak detection algorithm. To prove the absence of a memory leak, the al...
Automatic bug fixing has become a promising direction over manual fixing of bugs. In this work, we ...
Memory errors in C programs are the root causes of many defects and vulnerabilitiesin software engin...
Deallocation of dynamically allocated memory belongs to the responsibil- ity of programmers in the ...
We present and evaluate a new memory management technique foreliminating memory leaks in programs wi...
Abstract — We present and evaluate a new memory man-agement technique for eliminating memory leaks i...
Memory leaks are a continuing problem in the software developed with programming languages, such as ...
Static detection of memory leaks in a managed language such as Java is attractive because it does no...
Finding errors in software is a difficult problem: millions of dollars are spent in testing and debu...
Programs written in C and C++ are susceptible to memory errors, including buffer overflows and dangl...
Static analysis of programs in weakly typed languages such as C and C++ generally is not guaranteed ...
We describe a new technique for finding potential buffer overrun vulnerabilities in security-critica...