期刊文献+

嵌入式软件内存泄露检测方法研究 被引量:9

Research of memory leak detection method on embedded system
下载PDF
导出
摘要 动态内存分配为C/C++语言编程人员提供了极大的灵活性,但同时也带来了一个潜在的严重问题——内存泄露。与桌面系统相比,嵌入式系统处理能力弱、内存空间小、运行时间长,如果在程序运行期间发生内存泄露,将导致系统崩溃,造成不可预料的后果,因此需要在开发调试阶段尽早检测出造成内存泄露的代码。提出了一种基于动态检测技术和程序插装技术的嵌入式软件内存泄露分布式检测方法。该方法的实现思想是当程序在目标机运行时,插装代码自动截获内存操作函数,收集内存操作相关信息并把收集到的信息发送到服务器端处理,实现了嵌入式系统内存泄露的准确检测。实验结果证明,由于采用分布式技术进行信息处理,内存泄露检测效率得到了很大的提升。 Dynamic memory assignment brings a great deal of flexibility for the C/C++ programmers, but this poses a potentially serious problem-memory leak. Compared with desktop systems, embedded systems have weak processing capability, small mem- ory space, long running time. If memory leak occurs during the execution of a program, it results in unexpected consequences. Therefore, it is necessary to find the code which causes a memory leak as early as possible. In this paper, a distributed memory leak detection method for embedded software is presented which is based on dynamic detection techniques and program instru- mentation technology. The main idea of this method is that when the program is running on the target machine, the instrumenta- tion code automatically intercepts memory operation functions, collects memory operation information and sends the informa- tion to the server. The experimental results show that the performance of memory leak detection has been greatly improved through the use of distributed processing technology.
出处 《计算机工程与应用》 CSCD 2013年第14期56-59,65,共5页 Computer Engineering and Applications
关键词 嵌入式软件 内存泄露检测 动态插装 动态检测 分布式检测 embedded software memory leak detection dynamic instrumentation dynamic detection distributed detection
  • 相关文献

参考文献11

  • 1吕维梅,刘坚.C/C++程序安全漏洞的分类与分析[J].计算机工程与应用,2003,39(6):37-40.
  • 2Bush W R, Princus J D, Sielaff D J.A static analyzer for finding dynamic programming errors[J].Software Practice and Experience, 2000 : 775-800.
  • 3Ding Chen, Zhang Chengliang, Shen Xipeng, et al.Gated memory control for memory monitoring leak detection and garbage collection[C]//Proceedings of the 2005 Workshop on Memory System Performance , 2005 : 62-67.
  • 4许宝喜,王林章.一种动态内存泄漏检测方法[J].计算机技术与应用进展,2009.
  • 5Regehr J.Say no to stack overflow[EB/OL]. (2004-03-04).http://eetimes.com/design/embedded/4025013/Say-no-to-stack- overflow 1.
  • 6Huang J C.Instrumenting programs for data flow analysis, TR-U H-CS-77-4[R].[S.1.]:Univ of Houston,1977.
  • 7Xie Yichen,Alex A.Context-and path-sensitive memory leak detection[C]//Proceedings of the ESEC/FSE' 05, Lisbon, Por- tugal, 2005 : 115-125.
  • 8Tsai T, Vaidyanathan K, Gross K.Low-overhead run-time memory leak detection and recovery[C]//Proceedings of the 12th Pacific Rim International Symposium on Dependable Computing, 2006: 329-340.
  • 9pc-lint[EB/OL].[2012-05 - 10].http://www.gimpel.com/html/pcl.htm.
  • 10汪小林,王振林,孙逸峰,刘毅,张彬彬,罗英伟.利用虚拟化平台进行内存泄露探测[J].计算机学报,2010,33(3):463-472. 被引量:15

二级参考文献12

  • 1Xie Yichen, Aiken Alex. Context- and path-sensitive memory leak detection//Proeeedings of the ESEC/FSE'05. Lisbon, Portugal, 2005:115-125.
  • 2Tsai T, Vaidyanathan K, Gross K. Low-overhead run-time memory leak detection and recovery//Proceedings of the PRDC'06. Riverside, USA, 2006:329-340.
  • 3Qin Feng, Lu Shan, Zhou Yuanyuan. SafeMem: Exploiting ECC-memory for detecting memory leaks and memory corruption during production runs//Proceedings of the HPCA ' 05. San Francisco, USA, 2005:291-302.
  • 4Bungale Prashanth P, Luk Chi-Keung. PinOS: A programmable framework for whole-system dynamic instrumentation//Proceedings of the ACM Conference on Virtual Execution Environments(VEEr07). San Diego, California, USA, 2007:137-147.
  • 5Waldspurger Carl A. Memory resource management in VMware ESX server//Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI' 02). Boston, USA, 2002:181-194.
  • 6Barham Pet al. Xen and the Art of virtualization//Proceedings of the 19th ACM Symposium on Operating System Principles(SOSP'03). New York, USA, 2003:164-177.
  • 7Neiger Get al. Intel virtualization technology: Hardware support for efficient processor virtualization. Intel Technology Journal, 2006, 10(3) : 167- 177.
  • 8AMD. AMD- V^TM Nested Paging. Revision: 1.0. Issue Date: July, 2008.
  • 9Michael Vrable et al. Scalability, fidelity, and containment in the potemkin virtual honeyfarm//Proceedings of the 20th ACM Symposium on Operating System Principles (SOSP'05). Brighton, United Kingdom, 2005:148-162.
  • 10Jones S T, Arpaci-Dusseau A C, Arpaci-Dusseau R H. VMM-based hidden process detection and identification using Lyeosid//Proeeedings of the ACM Conference on Virtual Execution Environments (VEEr08). Seattle, USA, 2008: 91- 100.

共引文献15

同被引文献49

引证文献9

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部