2019
DOI: 10.1109/access.2019.2951168
|View full text |Cite
|
Sign up to set email alerts
|

Memory Leak Detection in IoT Program Based on an Abstract Memory Model SeqMM

Abstract: With the rapid growth of the Internet-of-Things (IoT), security issues for the IoT are becoming increasingly serious. Memory leaks are a common and harmful software defect for IoT programs running on resource-limited devices. Static analysis is an effective method for memory leak detection, however, because the existing methods cannot fully describe the memory state of IoT programs at run time, false positives and false negatives frequently occur. To improve the precision of memory leak detection, we propose a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 29 publications
0
2
0
Order By: Relevance
“…The reduction of the frame square, in which duplicate frame square copies are eliminated and record squares are isolated, is another option that can be considered for better deduplication process [26]. To eliminate duplicates, data is transferred to the farthest possible server in a serverside subtraction [27]. This tactic allows for the accumulation of more things without exceeding some kind of data transfer cap.…”
Section: Proposed Methodsmentioning
confidence: 99%
“…The reduction of the frame square, in which duplicate frame square copies are eliminated and record squares are isolated, is another option that can be considered for better deduplication process [26]. To eliminate duplicates, data is transferred to the farthest possible server in a serverside subtraction [27]. This tactic allows for the accumulation of more things without exceeding some kind of data transfer cap.…”
Section: Proposed Methodsmentioning
confidence: 99%
“…In this paper, we focus on important challenges including memory leaks for embedded systems' memory usage [22]. The software suffers because of it.…”
Section: Introductionmentioning
confidence: 99%