LOW-OVERHEAD MEMORY LEAK DETECTION USING ADAPTIVE STATISTICAL PROFILING WHAT’S THE PROBLEM? CONTRIBUTIONS EVALUATION WEAKNESS AND FUTURE WORKS.

Slides:



Advertisements
Similar presentations
Borland Optimizeit™ Profiler for the Microsoft .NET Framework
Advertisements

TPTP 4.4 New Java Profiler (JVMTI) Test and Performance Tools Platform (TPTP) Heap Analysis Enhancements for TPTP 4.4 Asaf Yaffe Software and Solutions.
Identify real savings, collaborate more effectively, improve contract compliance and evidence your success.
Uncovering Performance Problems in Java Applications with Reference Propagation Profiling PRESTO: Program Analyses and Software Tools Research Group, Ohio.
Runtime Techniques for Efficient and Reliable Program Execution Harry Xu CS 295 Winter 2012.
Automatic Memory Management Noam Rinetzky Schreiber 123A /seminar/seminar1415a.html.
Using Instruction Block Signatures to Counter Code Injection Attacks Milena Milenković, Aleksandar Milenković, Emil Jovanov The University of Alabama in.
Goldilocks: Efficiently Computing the Happens-Before Relation Using Locksets Tayfun Elmas 1, Shaz Qadeer 2, Serdar Tasiran 1 1 Koç University, İstanbul,
Lecture 10: Heap Management CS 540 GMU Spring 2009.
Michael Bond Kathryn McKinley The University of Texas at Austin Presented by Na Meng Most of the slides are from Mike’s original talk. Many thanks go to.
Bounding Space Usage of Conservative Garbage Collectors Ohad Shacham December 2002 Based on work by Hans-J. Boehm.
PRESTO: Program Analyses and Software Tools Research Group, Ohio State University Precise Memory Leak Detection for Java Software Using Container Profiling.
Department of Computer Sciences Cork: Dynamic Memory Leak Detection with Garbage Collection Maria Jump Kathryn S. McKinley
Guoquing Xu, Atanas Rountev Ohio State University Oct 9 th, 2008 Presented by Eun Jung Park.
Heap Growth Detection in C++ GrowthTracker 1. Heap Growth Detection in C++ Motivation Scalable City needs to run continuously –Many months without intervention/access.
Low-Overhead Memory Leak Detection Using Adaptive Statistical Profiling ZHANG Hansheng 1 Nov 2013.
CORK: DYNAMIC MEMORY LEAK DETECTION FOR GARBAGE- COLLECTED LANGUAGES A TRADEOFF BETWEEN EFFICIENCY AND ACCURATE, USEFUL RESULTS.
1 SWAT Memory Leak Detection Matthias Hauswirth. 2 Agenda Approaches to memory leak detection SWAT infrastructure Heap model Staleness predicates Leak.
SOS: Saving Time in Dynamic Race Detection with Stationary Analysis Du Li, Witawas Srisa-an, Matthew B. Dwyer.
IntroductionAQP FamiliesComparisonNew IdeasConclusions Adaptive Query Processing in the Looking Glass Shivnath Babu (Stanford Univ.) Pedro Bizarro (Univ.
ATOM: A System for Building Customized Program Analysis Tools.
By Chris Zachor.  Introduction  Background  Open Source Software  The SourceForge community and network  Previous Work  What can be done different?
Finding Low-Utility Data Structures Guoqing Xu 1, Nick Mitchell 2, Matthew Arnold 2, Atanas Rountev 1, Edith Schonberg 2, Gary Sevitsky 2 1 Ohio State.
Anomaly Detection Using Call Stack Information Security Reading Group July 2, 2004 Henry Feng, Oleg Kolesnikov, Prahlad Fogla, Wenke Lee, Weibo Gong Presenter:
Measurement and Analysis of Link Quality in Wireless Networks: An Application Perspective V. Kolar, Saquib Razak, P. Mahonen, N. Abu-Ghazaleh Carnegie.
Software Bloat Analysis: Detecting, Removing, and Preventing Performance Problems in Modern Large- Scale Object-Oriented Applications Guoqing Xu, Nick.
LeakChaser: Helping Programmers Narrow Down Causes of Memory Leaks Guoqing Xu, Michael D. Bond, Feng Qin, Atanas Rountev Ohio State University.
1 PATH: Page Access Tracking Hardware to Improve Memory Management Reza Azimi, Livio Soares, Michael Stumm, Tom Walsh, and Angela Demke Brown University.
Fingerprinting the Datacenter: Automated Classification of Performance Crises Kenneth Wade, Ling Su.
Fault Prediction and Software Aging
Bell: Bit-Encoding Online Memory Leak Detection Michael D. Bond Kathryn S. McKinley University of Texas at Austin.
1 Presenter: Chien-Chih Chen Proceedings of the 2002 workshop on Memory system performance.
Precise Memory Leak Detection for Java Software Using Container Profiling Guoqing Xu, Atanas Rountev Program analysis and software tools group Ohio State.
The College of William and Mary 1 Influence of Program Inputs on the Selection of Garbage Collectors Feng Mao, Eddy Zheng Zhang and Xipeng Shen.
Chapter 9 Fluency Assessment Tina Jensen. What? Fluency Assessment Consists of listening to students read aloud for a given time to collect information.
Tolerating Memory Leaks Michael D. Bond Kathryn S. McKinley.
Michael Bond Kathryn McKinley The University of Texas at Austin.
Proposed Work 1. Client-Server Synchronization Proposed Work 2.
Analyzing and Detecting Network Security Vulnerability Weekly report 1Fan-Cheng Wu.
Fast Conservative Garbage Collection Rifat Shahriyar Stephen M. Blackburn Australian National University Kathryn S. M cKinley Microsoft Research.
1 Fast and Efficient Partial Code Reordering Xianglong Huang (UT Austin, Adverplex) Stephen M. Blackburn (Intel) David Grove (IBM) Kathryn McKinley (UT.
Dynamic Object Sampling for Pretenuring Maria Jump Department of Computer Sciences The University of Texas at Austin Stephen M. Blackburn.
Copyright (c) 2004 Borys Bradel Myths and Realities: The Performance Impact of Garbage Collection Paper: Stephen M. Blackburn, Perry Cheng, and Kathryn.
Chameleon Automatic Selection of Collections Ohad Shacham Martin VechevEran Yahav Tel Aviv University IBM T.J. Watson Research Center Presented by: Yingyi.
Relyzer: Exploiting Application-level Fault Equivalence to Analyze Application Resiliency to Transient Faults Siva Hari 1, Sarita Adve 1, Helia Naeimi.
380C lecture 19 Where are we & where we are going –Managed languages Dynamic compilation Inlining Garbage collection –Opportunity to improve data locality.
Measuring Sustainable development: Achievements and Challenges Enrico Giovannini OECD Chief Statistician June 2005.
1 Garbage Collection Advantage: Improving Program Locality Xianglong Huang (UT) Stephen M Blackburn (ANU), Kathryn S McKinley (UT) J Eliot B Moss (UMass),
Hui Xu, Yangfan Zhou, Cuiyun Gao, Yu Kang, Michael R. Lyu
Detecting Inefficiently-Used Containers to Avoid Bloat Guoqing Xu and Atanas Rountev Department of Computer Science and Engineering Ohio State University.
Survey of Tools to Support Safe Adaptation with Validation Alain Esteva-Ramirez School of Computing and Information Sciences Florida International University.
Paper Title Authors names Conference and Year Presented by Your Name Date.
GC Assertions: Using the Garbage Collector To Check Heap Properties Samuel Z. Guyer Tufts University Edward Aftandilian Tufts University.
AppAudit Effective Real-time Android Application Auditing Andrew Jeong
1 The Garbage Collection Advantage: Improving Program Locality Xianglong Huang (UT), Stephen M Blackburn (ANU), Kathryn S McKinley (UT) J Eliot B Moss.
Cork: Dynamic Memory Leak Detection with Garbage Collection
  Performance Pitfalls in Large-Scale Java Applications Translated from COBOL Toshio Suganuma Toshiaki Yasue Tamiya Onodera Toshio Nakatani Presented.
Seminar in automatic tools for analyzing programs with dynamic memory
Using Execution Feedback in Test Case Generation
Zhenbo XU, Jian ZHANG, Zhongxing XU
HashKV: Enabling Efficient Updates in KV Storage via Hashing
PerfView Measure and Improve Your App’s Performance for Free
Cg-OxyR controls catalase transcription, recovery from lag phase, survival to H2O2 stress, and H2O2 scavenging rate. Cg-OxyR controls catalase transcription,
Memory Management and Garbage Collection Hal Perkins Autumn 2011
Dongyun Jin, Patrick Meredith, Dennis Griffith, Grigore Rosu
Dynamic Memory Management
Garbage Collection Advantage: Improving Program Locality
Molecular network analysis of UPLC-Q-TOF MS2 data.
Dynamic Memory Management
Chenxi Wang Huimin Cui Ting Cao John Zigman Haris Volos
Presentation transcript:

LOW-OVERHEAD MEMORY LEAK DETECTION USING ADAPTIVE STATISTICAL PROFILING WHAT’S THE PROBLEM? CONTRIBUTIONS EVALUATION WEAKNESS AND FUTURE WORKS

SWAT: A TOOL TO PREDICT WHETHER AN OBJECT IS GOING TO BE ACCESSED IN THE FUTURE

INTRO Novel: The authors coin the term “stale” objects ~ staleness. Staleness becomes the basis for several related works: Bond and McKinley 2006 (last week) Bond and McKinley 2009 Leak pruning, Bond and McKinley 2008 Tolerating memory leaks Tang et al 2008 Leak Survivor Cons: Identifies memory leak but not memory bloat (Xu and Rountev 2008; Xu and Bond 2011) False Positives (Novark 2009) A lot of work for programmers to find and fix the leak

WHAT’S THE PROBLEM? 2 challenges to memory management Bloat Memory leak SWAT uses a sample based approach for memory leak detection An “educated guess” whether object O is leaked at time T

CONTRIBUTION Captures leaks based on object access – staleness not reachability Obstacles to staleness approach Overhead of monitoring all heap access Leaks reported can include false positives Overcome obstacles Adaptive bursty tracing: hot paths access hot objects and cold paths access cold objects False positives may represent inefficient memory use

EVALUATION SWAT used a sampling rate of.1% with a runtime overhead of less than 5% False positives may indicate inefficient use of memory Case Studies at Microsoft for 18 months

WEAKNESS AND FUTURE WORKS Xu 2008; Xu and Bond 2011: Unnecessary memory consumption AND staleness Many normal objects can exhibit staleness and suspicious growth – need more detailed information without producing more memory and runtime overhead Novark 2009: Adaptive Bursty Tracing uses.1% sampling then it will miss all but 1 reference out of every 1,000; it produces a lot of false positives Our next paper will address some of the drawbacks to SWAT’s sampling approach

REFERENCES Bond and McKinley 2006 Bell: Bit-encoding online memory leak detection Bond and McKinley 2009 Leak pruning Bond and McKinley 2008 Tolerating memory leaks Novark et al 2009 Efficiently and Precisely Locating Memory Leaks and Bloat Tang et al 2008 Leak Survivor: Towards safely tolerating memory leaks for garbage collected languages Xu and Rountev 2008 Precise Memory Leak Detection Xu and Bond 2011 Leak Chaser