A Comprehensive Review of Static Memory Analysis

被引:0
作者
Akinyemi, Temidayo [1 ]
Solomon, Enoch [1 ]
Woubie, Abraham [2 ]
Lippert, Kari [3 ]
机构
[1] Virginia State Univ, Dept Comp Sci, Petersburg, VA 23806 USA
[2] Silo AI, Helsinki 00180, Finland
[3] Univ S Alabama, Dept Syst Engn, Mobile, AL 36688 USA
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Static analysis; Random access memory; Computer bugs; Codes; !text type='Python']Python[!/text; Pattern matching; Memory management; !text type='Java']Java[!/text; Security; Source coding; C plus plus languages; C plus plus; pattern matching; SharpChecker; static memory analysis; symbolic execution;
D O I
10.1109/ACCESS.2024.3482253
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This review aims to evaluate and compare various static analysis tools across multiple programming languages for memory management. The tools and techniques under scrutiny include pattern matching, symbolic execution, CppCheck, SharpChecker, FindBugs, CheckStyle, and Pylint. When examining the methods, pattern matching, and symbolic execution, we identified implementations using pattern matching and symbolic execution for each programming language. We focus on understanding the full scope of their capabilities and effectiveness in managing internal and external memory components such as RAM, SRAM, PROM, Cache, Optical Drive, etc. While static analysis tools do not directly analyze physical memory components, they are crucial in enhancing memory behavior. By detecting and addressing memory-related issues early in the development process, these tools contribute significantly to the overall quality of software systems. This review will thoroughly examine the strengths and weaknesses of each static analysis tool, aiding in selecting the most suitable tool or combination of tools for effective memory management across diverse programming environments.
引用
收藏
页码:170204 / 170226
页数:23
相关论文
共 47 条
  • [1] [Anonymous], 2024, What is Static Code Analysis? A Comprehensive Overview
  • [2] [Anonymous], 2003, P WODA ICSE WORKSH D
  • [3] Arusoaie A., 2015, Inria
  • [4] Ayewah N., 2010, P 19 INT S SOFTW TES, P241, DOI DOI 10.1145/1831708.1831738
  • [5] On the Applicability of Static Analysis for System Software using CodeChecker
    Balogh, Adam
    Szalay, Richard
    [J]. 2024 7TH INTERNATIONAL CONFERENCE ON SOFTWARE AND SYSTEM ENGINEERING, ICOSSE 2024, 2024, : 15 - 22
  • [6] Prototyping Symbolic Execution Engines for Interpreted Languages
    Bucur, Stefan
    Kinder, Johannes
    Candea, George
    [J]. ACM SIGPLAN NOTICES, 2014, 49 (04) : 239 - 253
  • [7] A Comparative Study of Industrial Static Analysis Tools
    Emanuelsson, Par
    Nilsson, Ulf
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2008, 217 (0C) : 5 - 21
  • [8] A critique of software defect prediction models
    Fenton, NE
    Neil, M
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1999, 25 (05) : 675 - 689
  • [9] Ferdinand C., 2007, P 3 EUR S VER VAL SO, P1
  • [10] Ferrara P, 2010, LECT NOTES COMPUT SC, V6117, P186, DOI 10.1007/978-3-642-13464-7_15