Analysis of inter-procedural data flow (IDF) is a commonly encountered challenge for verifying safety and security properties of large software. In order to address this challenge, a pragmatic approach is to identify IDF patterns that are known to occur in practice, and develop algorithms to detect and handle those patterns correctly. We perform an empirical study to gather the IDF patterns in Linux, which is essential to support such a pragmatic approach. In our study, we first analyzed the Linux code to study how reference to dynamically allocated memory in a function flows out of the function. We analyzed instances of memory allocation and identified 6 IDF patterns. Second, we mined and analyzed memory leak bug fixes from the Linux git r...
Various methods for memory fault detection have been developed through continuous study. However, ma...
This research determines how appropriate symbolic execution is (given its current implementation) fo...
Operating system kernels rely on fine-grained concurrency to achieve optimal performance on modern m...
University of Minnesota Ph.D. dissertation. 2021. Major: Computer Science. Advisor: Stephen McCamant...
A software system composed of applications running on embedded devices could be hard to monitor and ...
We introduce a static detector, Saber, for detecting memory leaks in C programs. Leveraging recent a...
2021 Fall.Includes bibliographical references.Scrubbing sensitive data before releasing memory is a ...
The behavior of modern systems lives in a complex landscape that is unique to its particular applica...
We introduce object ownership profiling, a technique for finding and fixing memory leaks in object-o...
The most common cyber-attack vector is exploit of software vulnerability. Despite much efforts towar...
Traditional digital forensics’ procedures to recover and analyze digital data were focused on media-...
Memory leaks are known to be a major cause of reliability and performance issues in software. This p...
Increasingly complex malware continues to evade detection, stealing information, taking systems offl...
A confidential program should not allow any information about its secret inputs to be inferred from ...
Analyzing the executions of a buggy program is essentially a data mining process: Tracing the data g...
Various methods for memory fault detection have been developed through continuous study. However, ma...
This research determines how appropriate symbolic execution is (given its current implementation) fo...
Operating system kernels rely on fine-grained concurrency to achieve optimal performance on modern m...
University of Minnesota Ph.D. dissertation. 2021. Major: Computer Science. Advisor: Stephen McCamant...
A software system composed of applications running on embedded devices could be hard to monitor and ...
We introduce a static detector, Saber, for detecting memory leaks in C programs. Leveraging recent a...
2021 Fall.Includes bibliographical references.Scrubbing sensitive data before releasing memory is a ...
The behavior of modern systems lives in a complex landscape that is unique to its particular applica...
We introduce object ownership profiling, a technique for finding and fixing memory leaks in object-o...
The most common cyber-attack vector is exploit of software vulnerability. Despite much efforts towar...
Traditional digital forensics’ procedures to recover and analyze digital data were focused on media-...
Memory leaks are known to be a major cause of reliability and performance issues in software. This p...
Increasingly complex malware continues to evade detection, stealing information, taking systems offl...
A confidential program should not allow any information about its secret inputs to be inferred from ...
Analyzing the executions of a buggy program is essentially a data mining process: Tracing the data g...
Various methods for memory fault detection have been developed through continuous study. However, ma...
This research determines how appropriate symbolic execution is (given its current implementation) fo...
Operating system kernels rely on fine-grained concurrency to achieve optimal performance on modern m...