[1] |
Shahriar H,North S,Mawangi E.Testing of memory leak in Android applications[C]∥Proc of the IEEE 15th International Symposium on High Assurance Systems Engineering,2014:176-183.
|
[2] |
Navas-Molina J A,Mishra S.Addressing memory exhaustion failures in Virtual Machines in a cloud environment[C]∥
|
|
Proc of 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks,2013:1-6.
|
[3] |
Shih-Kun H,Min-Hsiang H,Po-Yen H,et al.Software crash analysis for automatic exploit generation on binary programs[J].IEEE Transactions on Reliability,2014,63(1):270-289.
|
[4] |
Hayashi Y,Homma N,Mizuki T,et al.Analysis of electromagnetic information leakage from cryptographic devices with different physical structures[J].IEEE Transactions on Electromagnetic Compatibility,2013,55(3):571-580.
|
[5] |
Xu G, Rountev A.Precise memory leak detection for java software using container profiling[J].ACM Transactions on Software Engineering and Methodology,2013,22(3):1-28.
|
[6] |
Jung C,Lee S,Raman E,et al.Automated memory leak detection for production use[C]∥Proc of the 36th International Conference on Software Engineering,
|
20 |
14:825-836.
|
[7] |
Assmann U, Weinhardt M.Interprocedural heap analysis for parallelizing imperative programs[C]∥Proc of Workshop on Programming Models for Massively Parallel Computers,1993:74-82.
|
[8] |
Dong Long-ming,Wang Ji, Chen Li-qian, et al.Memory leak detection for heap-manipulating programs based on local heap abstraction[J].Journal of Computer Research and Development,2012,49(9):1832-1842.(in Chinese)
|
[9] |
Hastings R,Joyce B.Purify:Fast detection on memory leaks and access errors[C]∥Proc of the USENIX Winter Technical Conference,1992:125-138.
|
[10] |
Nethercote N,Seward J.Valgrind:A framework for heavyweight dynamic binary instrumentation[J].ACM SIGPLAN Notices,2007,42(6):89-100.
|
[11] |
Maxwell E K, Back G, Ramakrishnan N. Diagnosing memory leaks using graph mining on heap dumps[C]∥Proc of the 16th ACM SIGKDD International Confernece on Knowledge and Data Mining,2010:115-124.
|
[12] |
Heine D L,Lam M S.Static detection of leaks in polymorphic containers[C]∥Proc of the 28th International Confe- rence on Software Engineering (ICSE ’06),2006:252.
|
[13] |
Xie Y,Aiken A.Context- and path-sensitive memory leak detection[J].ACM SIGSOFT Software Engineering Notes,2005,30(5):115-125.
|
[14] |
Cherem S,Princehouse L,Rugina R.Practical memory leak detection using guarded value-flow analysis[J].
|
|
ACM SIGPLAN Notices,2007,42(6):480-491.
|
[15] |
Sui Y,Ye D,Xue J.Detecting memory leaks statically with full-sparse value-flow analysis[J].IEEE Transactions on Software Engineering,2014,40(2):107-122.
|
[16] |
Common Vulnerabilities and Exposure[EB/OL].[2019-08-30].http://cve.mitre.org.
|
[17] |
Liu Shu-wen.A method to detect memory leak of C++ field member[D].Beijing:Beijing University of Posts and Telecommunications,2015.(in Chinese)
|
[18] |
Smaragdakis Y,Balatsouras G.Pointer analysis[J].Foundations and Trends in Programming Language,2015,2(1):1-69.
|
[19] |
Li Qian.Research on points-to analysis for Java[D].Nanjing:Nanjing University,2012.(in Chinese)
|
[20] |
Zhang Wei,Gong Yun-zhan,Lu Qing-ling,et al.Research on dynamic memory faults testing method based on pointer mapping sets[J].Chinese Journal of Computers,2009,32(11):2274-2281.(in Chinese)
|
[21] |
Hardekopf B,Lin C.Flow-sensitive pointer analysis for millions of lines of code[C]∥Proc of the
|
|
the 9th Annual IEEE/ACM International Symposium on Code Generation and Optimization,2011:289-298.
|
[22] |
Li Qian,Tang En-yi,Dai Xue-feng,et al.Optimization of points-to analysis for Java[J].Journal of Software,2011,22(6):1140-1154.(in Chinese)
|
[23] |
Chen Bei,Xu Qing-guo.C++ program memory leakage analysis based on static test[J].Computer Engineering & Science,2017,39(1):118-124.(in Chinese)
|
[24] |
Sui Y,Xue J.SVF:Interprocedural static value-flow analysis in LLVM[C]∥Proc of the 25th Internatioal Conference on Compiler Construction,2016:265-266.
|
[25] |
Nurit D.Detecting memory errors via static pointer analysis[D].TelAviv:TelAviv University,1999.
|
[26] |
Weiss M A. Data structures and algorithm analysis in C[M].2nd ed. Boston:Addison-Wesley,1996.
|
|
附中文参考文献:
|
[8] |
董龙明,王戟,陈立前,等.基于局部堆内存抽象表示的堆操作程序内存泄露检测[J].计算机研究与发展,2012,49(9):1832-1842.
|
[17] |
刘书文.C++类成员内存泄漏模式研究及检测方法[D].北京:北京邮电大学,2015.
|
[19] |
李倩.Java程序指向分析研究[D].南京:南京大学,2012.
|
[20] |
张威,宫云战,卢庆龄,等.基于指针映射集的动态内存故障测试方法研究[J].计算机学报,2009,32(11):2274-2281.
|
[22] |
李倩,汤恩义,戴雪峰,等.Java指针指向分析优化[J].软件学报,2011,22(6):1140-1154.
|
[23] |
陈贝,许庆国.基于静态检测的C++内存泄漏分析[J].计算机工程与科学,2017,39(1):118-124.
|