期刊文献+

基于静态分析方法的Android应用内存泄漏检测模型

A memory leak detection model for Android applications based on static analysis method
下载PDF
导出
摘要 因为部分开发人员对Android内存管理机制理解模糊,所以Android应用程序的内存泄漏问题较为常见.为了解决内存泄漏的检测问题,首先分析了Android系统的内存管理机制,通过代码分析找出了Android应用内存泄漏的原因,并根据内存泄漏与组件、资源访问的相关性进行分类.在此基础上,提出了一种Android应用内存泄漏检测模型.该模型使用静态分析方法在反编译Android应用程序源码的基础上监测所有可能的内存泄漏代码,针对不同的代码缺陷类型使用不同的算法进行监测.通过实验分析,模型的检测正确率达到96.3%,优于自动化分析工具Lint,能够有效检测Android应用中的内存泄漏. Memory leakage in Android application development is very common.Some application developers have a vague understanding of Android memory management mechanism,which has a certain impact on Android system.In order to solve the problem of memory leakage detection,this paper analyzed the memory management mechanism of Android system at first,and classified them according to the Android component and resource access.On the basis of accurate classification,a memory leak detection model for Android applications based on static analysis method was proposed.Through experimental analysis,the detection accuracy of the model reaches 96.3%,which is better than the automatic analysis tool of Lint,and can effectively detect memory leakage in Android applications.
作者 沙有闯 胡学钢 付贤政 袁明磊 SHA You-chuang;HU Xue-gang;FU Xian-zheng;YUAN Ming-lei(School of Computing and Information,Hefei University of Technology,Hefei 230601,China;Department of Information,Anhui Vocational College of Defense Technology,Lu an 237011,China;Department of Computer Science and Technology,Nanjing University,Nanjing 210023,China)
出处 《吉林师范大学学报(自然科学版)》 2021年第2期83-91,共9页 Journal of Jilin Normal University:Natural Science Edition
基金 安徽省高校学科(专业)拔尖人才学术资助项目(gxbjZD2020126) 安徽省教育厅自然科学研究重点项目(KJ2019A1183) 安徽省教育厅质量工程项目(2018sxzx31,2019dsgzs38,2020zyq17)。
关键词 ANDROID应用 内存泄漏 静态分析方法 泄漏检测算法 Android applications memory leakage static analysis method memory leak detection algorithm
  • 相关文献

参考文献3

二级参考文献29

  • 1Rational Purify. Purify: Fast Detection of Memory Leaks and Access Errors[EB/OL]. http://www, ibm. com/software/awdtools/purify/.
  • 2Qin Feng,Lu Shan,Zhou Yuanyuan. SafeMem : Exploiting ECC-Mem- ory for Detecting Memory Leaks and Memory Corruption during Produc- tion Runs [ C ]//HPCA' 05, 2005.
  • 3Paul Barham, Boris Dragovic, Keir Fraser. Xen and the art of virtual- ization[ C ]//Proceedings of the nineteenth ACM symposium on Oper- ating systems principles, October 19 -22, 2003.
  • 4[ntel. lntel Virtualization Technology: Hardware support for efficient processor virtualization[S]. Intel.
  • 5Xie Yichen,Alex Aiken. Context-and Path-sensitive Memory Leak De- tection[ C]// Proceedings of ESEC/FSE 2005, Lisbon, Portugal,2005.
  • 6Helena Aberg Ostlund. Memory Leak Detection with the JRockit JVM [M]. 2005.
  • 7Tsai T, Vaidyanathan K, Gross K. Low-Overhead Run-Time Memory Leak Detection and Recovery [ C ]//PRDC' 06, 2006.
  • 8Julian Seward,Nicholas Nethercote. Using Valgrind to detect undefined value errors with bit-precision [ C ]//Proceedings of the USENIX An- num Technical Conference, USA, 2005 : 17 - 30.
  • 9Prashanth P Bungale, Luk Cti - Keung. PinOS: A Programmable Framework for Whole-System Dynamic Instrumentation [ C ]//ACM Conference on Virtual Execution Envi-ronments ( VEE' 07), 2007.
  • 10李肖坚,夏冰,钟达夫.一种缓冲区溢出防御虚拟机的研究与设计[C]//2005年国家网络与信息安全技术研讨会.2005.

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部