Detection of Precise C/C++ Memory Leakage by diagnosing Heap dumps using Inter procedural Flow Analysis statistics
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 10
Abstract
Memory leak is a time consuming bug often created by C++ developers. Detection of memory leaks is often tedious. Things get worst if the code is not written by you, or if the code base is quite huge. The most difficult coding bugs such as Memory Corruption, reading uninitialized memory, using freed memory, are challenging in recognizing and fixing due to the delay and non-determinism linking the error. Detecting memory leaks is challenging because real-world applications are built on multiple layers of software frameworks, making it difficult for a developer to know whether observed references to objects are legitimate or the cause of a leak. Our aim is to build a fast and feature rich c Heap Analyzer that helps the user in finding memory leaks and to reduce memory consumption. By using the Heap analyzer. Productive heap dumps with hundreds of millions of objects and the retained sizes of objects can be calculated quickly [2]. This analyzer also prevents the garbage collector from collecting objects, run a report to automatically extract heap leak suspects. The Heap Analyzer allows the users in finding the possible heap leak areas in various C/C++ applications through its Context flow analysis and heap dump analysis. Our approach identifies not just leaking candidates and their structure, but also provides aggregate information about the access path to the leaks.
Authors and Affiliations
S. Poornima, Dr. C. V. Guru Rao, S. P. Anandaraj
Providing High Security for WSN’s Using Distributed Hash Table (DHT)
There have been two novel node clone detection protocols with diverse tradeoffs on network circumstances and performance. The first one is based on a distributed hash table (DHT) by which a completely decentralized,...
Automated Sentiment Analysis System Using Machine Learning Algorithms
Sentiment analysis can be very useful for business if employed correctly. In this article, I will attempt to demystify the process, provide context, and offer some concrete examples of how businesses can utilize it....
Design Of A Rceat Architecture For Detecting Multi- Bit Error In RFID
Radio Frequency Identification (RFID) plays an important role in Warehouse Management, especially during the automatic identification of items. Unfortunately, a warehouse environment has electromagnetic interferences...
Prevention of Routing Attack in Mobile Ad-Hoc Networks: A comparative study
Mobile ad hoc networks (MANET) is a wireless network where nodes work in standalone fashion. The MANET faces various security challenges due to the environment in which it is deployed. The nodes of mobile ad hoc netw...
Recent Issues and Its Quick Fixes for Various Data Repositories
The aim of this study was to assess the issues and their quick fixes of databases. But the database accuracy has a trickle down effect in most implementations. This paper proposes the overall guidance about the techni...