Proceedings of the 10th European Software Engineering Conference Held Jointly With 13th ACM SIGSOFT International Symposium on 2005
DOI: 10.1145/1081706.1081728
|View full text |Cite
|
Sign up to set email alerts
|

Context- and path-sensitive memory leak detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
56
0

Year Published

2006
2006
2022
2022

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 80 publications
(57 citation statements)
references
References 15 publications
1
56
0
Order By: Relevance
“…After we identify these procedures, we could identify and fix the leaks of m in the procedure which calls an alloc procedure of m but itself is not an alloc procedure of m. This is based on Xie and Aiken's rule [8]: any allocation in a procedure P that does not escape from P is leaked if it is not deallocated in P . In our example, we should check and fix leaks in the procedure check_records.…”
Section: B Basic Ideamentioning
confidence: 99%
See 2 more Smart Citations
“…After we identify these procedures, we could identify and fix the leaks of m in the procedure which calls an alloc procedure of m but itself is not an alloc procedure of m. This is based on Xie and Aiken's rule [8]: any allocation in a procedure P that does not escape from P is leaked if it is not deallocated in P . In our example, we should check and fix leaks in the procedure check_records.…”
Section: B Basic Ideamentioning
confidence: 99%
“…The main line of static approaches is to detect leaks [7,8,29,9,10,13,11,12,30]. Most detection approaches report only the locations where the leaked memory is allocated.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The same limitation applies to the techniques described in [12,9]. Similarly, the static analyses described in [6,26] aim at detecting leaks caused by objects not reachable from program variables. Therefore they cannot detect the kind of leaks we aim at with our analysis.…”
Section: Related Workmentioning
confidence: 99%
“…Generally, memory leak detection methods can be divided into static detection and dynamic detection. Static detection methods, such as context-sensitive, path-sensitive and flow-sensitive [7]- [10], are usually applied to detect memory leaks. But static detection could not reflect the run-time heap information accurately.…”
Section: Introductionmentioning
confidence: 99%