Demand-Driven Memory Leak Detection Based on Flow-and Context-Sensitive Pointer Analysis

来源 :计算机科学技术学报 | 被引量 : 0次 | 上传用户:jaczolo
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
We present a demand-driven approach to memory leak detection algorithm based on flow- and context-sensitive pointer analysis. The detection algorithm firstly assumes the presence of a memory leak at some program point and then runs a backward analysis to see if this assumption can be disproved. Our algorithm computes the memory abstraction of programs based on points-to graph resulting from flow- and context-sensitive pointer analysis. We have implemented the algorithm in the SUIF2 compiler infrastructure and used the implementation to analyze a set of C benchmark programs.The experimental results show that the approach has better precision with satisfied scalability as expected.
其他文献
A fully conservative form applied to a coupled system of two-dimensional water flow and solute motion is presented. A cell-centred finite volume method based on
We presented a simple route to prepare nanoscale CdTe urchins in a tri-n-octylphosphine oxide(TOPO)system.CdTe urchins consisted of a core and several attached
Isothermal transformation (TTT) behavior of the low carbon steels with two Si con-tents (0.50 wt pct and 1.35 wt pct) was investigated with and without the prio
Demands on software reliability and availability have increased tremendously due to the nature of present day applications. We focus on the aspect of software f
Software testing is an important technique to assure the quality of software systems, especially high-confidence systems. To automate the process of software te
Electromagnetic emission (EME) is a kind of physical phenomenon accompanying the process of deformation and frac-ture of loaded coal and rock and it is of impor
To find the predual spaces PαRn) of QαRn) is an important motivation in the study of Q spaces. In this article, wavelet methods are used to solve this problem
A facile and convenient synthesis method has been developed for substituted quinoxalines and 2H-benzo[b][1,4]oxazines from the reactions of α-bromoketones with
porous coordination polymer, {[Ce(dpdo)4(H2O)3](Pmo12O4)(dpdo)0.5(H2O)4}n1 (dpdo = 4,4"-bipyridine-N,N-dioxide), templated by double-Keggin-type polyanions was
Emerging with open environments, the software paradigms, such as open resource coalition and Internetware,present several novel characteristics including user-c