[1] |
Gan Hongxing,Jin Dahai,Gong Yunzhan.A static memory leak detection method based on executable source code[J].Journal of Inner Mongolia University(Natural Science Edition),2011,42(5):515520.(in Chinese)
|
[2] |
Xiao Qing, Zhang Wei, Gong Yunzhan. A static analysis method for memory leak[J].Journal of Academy of Armored Force Engineering,2004,18(2):2326.(in Chinese)
|
[3] |
Yang Changkun, Xu Qingguo. The technology and implementation of extracting control flow model of C program[J].Computer Science,2014,41(5):208214.(in Chinese)
|
[4] |
Zhang Wei,Li Hui,Bi Xuejun,et al.Research on static testing method of memory leak faults[C]∥Proc of the 4th China Test Academic Conference,2006:1.(in Chinese)
|
[5] |
Ye Junmin, Wei Peng, Jin Cong, et al. Static analysis of memory leak fault[J].Computer Science,2010,37(6):171175.(in Chinese)
|
[6] |
Sui Y,Ye D,Xue J.Detecting memory leaks statically with fullsparse valueflow analysis[J].IEEE Transactions on Software Engineering,2014,40(2):107122.
|
[7] |
Xie Y,Aiken A.Context and pathsensitive memory leak detection[J].ACM SIGSOFT Software Engineering Notes,2005,30(5):115125.
|
[8] |
Jung Y,Yi K.Practical memory leak detector based on parameterized procedural summaries[C]∥Proc of the 7th ACM International Symposium on Memory Management,2008:131140.
|
[9] |
Orlovich M,Rugina R.Memory leak analysis by contradiction[M]∥Static Analysis.Berlin Heidelberg:Springer, 2006:405424.
|
[10] |
Heine D L, Lam M S. A practical flowsensitive and contextsensitive C and C++ memory leak detector[J].ACM SIGPLAN Notices,2003,38(5):168181.
|
[11] |
Liu Ming,Rong Mengtian,Guo Fen,et al.Realization of dynamic memory leak detection technology under Linux[J].Information Technology,2007,31(9):2932.(in Chinese)
|
[12] |
Qu B,Shu J,Huang Y,et al.Memory leak dynamic monitor based on hook technique[C]∥Proc of
|
|
IEEE International Conference on Computational Intelligence and Software Engineering(CiSE 2009),2009:14.
|
[13] |
Wang Zemin,Lu Dongxin,Xu Lifeng,et al.Arithmetic of memory leakage detection in embedded system software and its implementation[J].Computer Engineering,2005,31(13):8486.(in Chinese)
|
|
附中文参考文献:
|
[1] |
甘红星,金大海,宫云战.基于源代码的内存泄漏静态分析方法[J].内蒙古大学学报(自然科学版),2011,42(5):515520.
|
[2] |
肖庆,张威,宫云战,等.内存泄漏的一种静态分析方法[J].装甲兵工程学院学报,2004,18(2):2326.
|
[3] |
杨昌坤,许庆国.C 程序控制流程模型的提取技术与实现[J].计算机科学,2014,41(5):208214.
|
[4] |
张威,李辉,毕学军,等.内存泄漏故障静态测试方法研究[C]∥第四届中国测试学术会议论文集,2006:1.
|
[5] |
叶俊民,魏鹏,金聪,等.内存泄漏故障静态分析研究[J].计算机科学,2010,37(6):171175.
|
[11] |
刘明,戎蒙恬,郭芬,等.一种 Linux 下动态内存泄漏检测技术的实现[J].信息技术,2007,31(9):2932.
|
[13] |
王泽民,芦东昕,徐立峰,等.嵌入式系统软件内存泄漏监测的算法和实现[J].计算机工程,2005,31(13):8486.
|