Proceedings of the 2012 International Symposium on Software Testing and Analysis 2012
DOI: 10.1145/2338965.2336784
|View full text |Cite
|
Sign up to set email alerts
|

Static memory leak detection using full-sparse value-flow analysis

Abstract: We introduce a static detector, Saber, for detecting memory leaks in C programs. Leveraging recent advances on sparse pointer analysis, Saber is the first to use a full-sparse value-flow analysis for leak detection. Saber tracks the flow of values from allocation to free sites using a sparse valueflow graph (SVFG) that captures def-use chains and value flows via assignments for all memory locations represented by both top-level and address-taken pointers. By exploiting field-, flow-and context-sensitivity duri… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
55
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 116 publications
(56 citation statements)
references
References 29 publications
(65 reference statements)
0
55
0
Order By: Relevance
“…In SSA-based pointer analysis, the program is first translated to SSA form and the points-to graphs contain only the information about the SSA program. Unlike leak detection approaches [11,12], which could directly work on converted SSA program, our approach needs to modify the source code to fix leaks, and cannot work on the converted SSA program.…”
Section: B Basic Ideamentioning
confidence: 99%
See 4 more Smart Citations
“…In SSA-based pointer analysis, the program is first translated to SSA form and the points-to graphs contain only the information about the SSA program. Unlike leak detection approaches [11,12], which could directly work on converted SSA program, our approach needs to modify the source code to fix leaks, and cannot work on the converted SSA program.…”
Section: B Basic Ideamentioning
confidence: 99%
“…Though this fix is technically safe, it may not be efficient because the deallocation may be too far from its last use. This problem does not exist in leak detection algorithms [9,12], as a detection in main still detects the leak.…”
Section: B Basic Ideamentioning
confidence: 99%
See 3 more Smart Citations