Detection of Precise C/C++ Memory Leakage by diagnosing Heap dumps using Inter procedural Flow Analysis statistics
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 10
Abstract
Memory leak is a time consuming bug often created by C++ developers. Detection of memory leaks is often tedious. Things get worst if the code is not written by you, or if the code base is quite huge. The most difficult coding bugs such as Memory Corruption, reading uninitialized memory, using freed memory, are challenging in recognizing and fixing due to the delay and non-determinism linking the error. Detecting memory leaks is challenging because real-world applications are built on multiple layers of software frameworks, making it difficult for a developer to know whether observed references to objects are legitimate or the cause of a leak. Our aim is to build a fast and feature rich c Heap Analyzer that helps the user in finding memory leaks and to reduce memory consumption. By using the Heap analyzer. Productive heap dumps with hundreds of millions of objects and the retained sizes of objects can be calculated quickly [2]. This analyzer also prevents the garbage collector from collecting objects, run a report to automatically extract heap leak suspects. The Heap Analyzer allows the users in finding the possible heap leak areas in various C/C++ applications through its Context flow analysis and heap dump analysis. Our approach identifies not just leaking candidates and their structure, but also provides aggregate information about the access path to the leaks.
Authors and Affiliations
S. Poornima, Dr. C. V. Guru Rao, S. P. Anandaraj
Real Time Traffic Density And Vehicle Count Using Image Processing Technique
Monitoring Indian trafic and calculation of peak hours and density count in a day helps to develop necessary travel and traffic volume estimates, required to satisfy the needs in the are of road planning, constructio...
Dynamic Authentication over Graphical Passwords using Visual Cryptography
CAPTCHA is a test build by computer programs which human can pass but computer programs cannot pass CAPTCHA as graphical passwords (CaRP) are a graphical password scheme used for a user access authentication. It is m...
Performance Evaluation of AODV DSDV and OLSR Routing Protocols with Varying FTP Connections in MANET
A mobile ad hoc network is self configuring, resource poor and has dynamically changing topology. Keeping in view these constraints and complexity number of routing protocols are proposed. The most popular protocols...
Implementation of Grid Based Distributed 3P4W System Using ANFIS Control
The increase in global energy demand and load demand, the Renewable Energy Sources (RES) are increasingly connected in the distribution systems which utilises power electronics Converters/Inverters. This paper sugges...
Effective Business Analytics using Prefetching Technique
Nowadays, the Web is a vital resource in conducting business apart from information search and entertainment. Predicting users shopping pattern, finding frequent buyers and popular product identification in the e-co...