Empirical study of inter-procedural data flow (IDF) patterns for memory leak analysis in Linux
dc.contributor.advisor | Suraj Kothari | |
dc.contributor.author | Singh, Damanjit | |
dc.contributor.department | Electrical and Computer Engineering | |
dc.date | 2018-08-11T15:49:23.000 | |
dc.date.accessioned | 2020-06-30T02:55:33Z | |
dc.date.available | 2020-06-30T02:55:33Z | |
dc.date.copyright | Wed Jan 01 00:00:00 UTC 2014 | |
dc.date.embargo | 2001-01-01 | |
dc.date.issued | 2014-01-01 | |
dc.description.abstract | <p>Analysis of inter-procedural data flow (IDF) is a commonly encountered challenge for verifying safety and security properties of large software. In order to address this challenge, a pragmatic approach is to identify IDF patterns that are known to occur in practice, and develop algorithms to detect and handle those patterns correctly. We perform an empirical study to gather the IDF patterns in Linux, which is essential to support such a pragmatic approach.</p> <p>In our study, we first analyzed the Linux code to study how reference to dynamically allocated memory in a function flows out of the function. We analyzed instances of memory allocation and identified 6 IDF patterns. Second, we mined and analyzed memory leak bug fixes from the Linux git repository. Third, we surveyed the literature for static analysis tools that can detect memory leaks. Based on these studies, we found that the set of IDF patterns associated with the memory leak bug fixes in Linux and those that can be detected by the current static analysis tools is a subset of the 6 IDF patterns we identified.</p> | |
dc.format.mimetype | application/pdf | |
dc.identifier | archive/lib.dr.iastate.edu/etd/14270/ | |
dc.identifier.articleid | 5277 | |
dc.identifier.contextkey | 7842457 | |
dc.identifier.doi | https://doi.org/10.31274/etd-180810-3822 | |
dc.identifier.s3bucket | isulib-bepress-aws-west | |
dc.identifier.submissionpath | etd/14270 | |
dc.identifier.uri | https://dr.lib.iastate.edu/handle/20.500.12876/28456 | |
dc.language.iso | en | |
dc.source.bitstream | archive/lib.dr.iastate.edu/etd/14270/Singh_iastate_0097M_14572.pdf|||Fri Jan 14 20:17:21 UTC 2022 | |
dc.subject.disciplines | Computer Engineering | |
dc.subject.keywords | Computer Engineering | |
dc.subject.keywords | Empirical Study | |
dc.subject.keywords | Inter-procedural Data Flow | |
dc.subject.keywords | Linux | |
dc.subject.keywords | Memory Leak | |
dc.title | Empirical study of inter-procedural data flow (IDF) patterns for memory leak analysis in Linux | |
dc.type | article | |
dc.type.genre | thesis | |
dspace.entity.type | Publication | |
relation.isOrgUnitOfPublication | a75a044c-d11e-44cd-af4f-dab1d83339ff | |
thesis.degree.level | thesis | |
thesis.degree.name | Master of Science |
File
Original bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- Singh_iastate_0097M_14572.pdf
- Size:
- 769.11 KB
- Format:
- Adobe Portable Document Format
- Description: