Zhenbo XU, Jian ZHANG, Zhongxing XU

Slides:



Advertisements
Similar presentations
Auto-Generation of Test Cases for Infinite States Reactive Systems Based on Symbolic Execution and Formula Rewriting Donghuo Chen School of Computer Science.
Advertisements

Runtime Techniques for Efficient and Reliable Program Execution Harry Xu CS 295 Winter 2012.
Software Assurance Metrics and Tool Evaluation (SAMATE) Michael Kass National Institute of Standards and Technology
Great Theoretical Ideas in Computer Science.
CS364 CH16 Control Unit Operation
Finding bugs: Analysis Techniques & Tools Comparison of Program Analysis Techniques CS161 Computer Security Cho, Chia Yuan.
PRESTO: Program Analyses and Software Tools Research Group, Ohio State University Precise Memory Leak Detection for Java Software Using Container Profiling.
Guoquing Xu, Atanas Rountev Ohio State University Oct 9 th, 2008 Presented by Eun Jung Park.
LOW-OVERHEAD MEMORY LEAK DETECTION USING ADAPTIVE STATISTICAL PROFILING WHAT’S THE PROBLEM? CONTRIBUTIONS EVALUATION WEAKNESS AND FUTURE WORKS.
CORK: DYNAMIC MEMORY LEAK DETECTION FOR GARBAGE- COLLECTED LANGUAGES A TRADEOFF BETWEEN EFFICIENCY AND ACCURATE, USEFUL RESULTS.
HTT: A novel technique for automatic test case selection designed for regression testing Zichuan (Jerry) Ye Department of Computer Science 1.
Some Improvements for More Precise Model Checking Zhi Zhang State Key Laboratory for Novel Software Technology Nanjing University, China.
Testing and Analysis of Device Drivers Supervisor: Abhik Roychoudhury Author: Pham Van Thuan 1.
1 Static Analysis Methods CSSE 376 Software Quality Assurance Rose-Hulman Institute of Technology March 20, 2007.
Precise Inter-procedural Analysis Sumit Gulwani George C. Necula using Random Interpretation presented by Kian Win Ong UC Berkeley.
Establishing Local Temporal Heap Safety Properties with Applications to Compile-Time Memory Management Ran Shaham Eran Yahav Elliot Kolodner Mooly Sagiv.
 KEY IDEAS  TOOLS  CONTACT INFORMATION  PUBLISHER INFORMATION.
Program Representations Xiangyu Zhang. CS590Z Software Defect Analysis Program Representations  Static program representations Abstract syntax tree;
Chapter 16 Programming and Languages: Telling the Computer What to Do.
Overview of program analysis Mooly Sagiv html://
OHT 1.1 Galin, SQA from theory to implementation © Pearson Education Limited 2004 The uniqueness of software quality assurance The environments for which.
Precise Memory Leak Detection for Java Software Using Container Profiling Guoqing Xu, Atanas Rountev Program analysis and software tools group Ohio State.
Scalable Defect Detection Manuvir Das, Zhe Yang, Daniel Wang Center for Software Excellence Microsoft Corporation.
Software testing techniques Testing criteria based on data flow
Control Flow Resolution in Dynamic Language Author: Štěpán Šindelář Supervisor: Filip Zavoral, Ph.D.
computer
Aditya V. Nori, Sriram K. Rajamani Microsoft Research India.
Software Engineering Laboratory, Department of Computer Science, Graduate School of Information Science and Technology, Osaka University 1 Design and Implementation.
Static Program Analysis of Embedded Software Ramakrishnan Venkitaraman Graduate Student, Computer Science Advisor: Dr. Gopal Gupta.
DTS ( Defect Testing System ) Yang Zhao Hong, Gong Yun Zhan,Xiao Qing, Wang Ya Wen Beijing University of Posts and Telecommunications
Definition of Terms Software/Programs Programs that directs the operation of a computer system Set of instructions Codes Programming Process of planning,
Effective Interprocedural Resource Leak Detection ICSE 10 Emina Torlak Satish Chandra IBM T.J. Watson Research Center, USA.
Static Program Analysis of Embedded Software Ramakrishnan Venkitaraman Graduate Student, Computer Science Advisor: Dr. Gopal Gupta
Page 1 5/2/2007  Kestrel Technology LLC A Tutorial on Abstract Interpretation as the Theoretical Foundation of CodeHawk  Arnaud Venet Kestrel Technology.
ESEC/FSE-99 1 Data-Flow Analysis of Program Fragments Atanas Rountev 1 Barbara G. Ryder 1 William Landi 2 1 Department of Computer Science, Rutgers University.
PRESTO: Program Analyses and Software Tools Research Group, Ohio State University Merging Equivalent Contexts for Scalable Heap-cloning-based Points-to.
Pointer Analysis Survey. Rupesh Nasre. Aug 24, 2007.
High Confidence Software and Systems HCMDSS Workshop Brad Martin June 2, 2005.
School of Computer Science & Information Technology G6DICP - Lecture 6 Errors, bugs and debugging.
The Yogi Project Software property checking via static analysis and testing Aditya V. Nori, Sriram K. Rajamani, Sai Deep Tetali, Aditya V. Thakur Microsoft.
Detecting Inefficiently-Used Containers to Avoid Bloat Guoqing Xu and Atanas Rountev Department of Computer Science and Engineering Ohio State University.
Static Techniques for V&V. Hierarchy of V&V techniques Static Analysis V&V Dynamic Techniques Model Checking Simulation Symbolic Execution Testing Informal.
1 Iterative Program Analysis Mooly Sagiv Tel Aviv University Textbook: Principles of Program.
Research on self-adaptive decision-making mechanism for competition strategies in robot soccer Frontiers of Computer Science, 2015, 9(3):485–494 Haobin.
1 Program Analysis Too Loopy? Set the Loops Aside Eric Larson September 25, 2011 Seattle University.
Memory Protection through Dynamic Access Control Kun Zhang, Tao Zhang and Santosh Pande College of Computing Georgia Institute of Technology.
Static Software Metrics Tool
Tool Support for Testing
A question of science Circuit Symbols
Lazy Preemption to Enable Path-Based Analysis of Interrupt-Driven Code
Introduction to programming
Chapter 8 – Software Testing
Harry Xu University of California, Irvine & Microsoft Research
Secure Software Development: Theory and Practice
High Coverage Detection of Input-Related Security Faults
New Ideas Track: Testing MapReduce-Style Programs Christoph Csallner, Leonidas Fegaras, Chengkai Li Computer.
Software testing strategies 2
SUDS: An Infrastructure for Creating Bug Detection Tools
تحليل الحساسية Sensitive Analysis.
Performance Optimization for Embedded Software
Demand-Driven Context-Sensitive Alias Analysis for Java
Dynamic Program Analysis
CSC4005 – Distributed and Parallel Computing
CS5103 Software Engineering
October 29 Review for 2nd Exam Ask Questions! 4/26/2019
IntScope: Automatically Detecting Integer overflow vulnerability in X86 Binary Using Symbolic Execution Tielei Wang, TaoWei, ZhingiangLin, weiZou Purdue.
Line Graphs.
SeeSoft A Visualization Tool..
Symbolic Execution Tools for Software Testing
Symbolic Execution Tools for Software Testing
Presentation transcript:

Zhenbo XU, Jian ZHANG, Zhongxing XU Melton: a practical and precise memory leak detection tool for C programs Zhenbo XU, Jian ZHANG, Zhongxing XU Frontiers of Computer Science, 2015, 9(1):34–54

The Problem & Basic Ideas Memory leaks: a common type of defect in C programs which may lead to system performance degradation How can we detect memory leaks through static analysis? Ideas: interprocedural path-sensitive symbolic execution novel analysis model called memory state transition graph (MSTG)

Tool and Experiments A tool called Melton is implemented, which detects memory leaks in C programs. The tool has been used to find new bugs in some open source software: which-2.16 libosip2-3.6.0 wget-1.13.3 openssh-5.9p1 sqlite-3.7.11