Static Analysis of Memory Leak in Android Applications

被引:0
作者
Zhou, Di [1 ]
Fu, Zhengyu [2 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 210016, Peoples R China
[2] Dalian Nationality Univ, Coll Comp Sci & Engn, Dalian 116650, Peoples R China
来源
PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING 2015 (ICMMCCE 2015) | 2015年 / 39卷
关键词
Memory Leak; Static Analysis; Android Applications;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The popularity of Android applications have grown dramatically in the last few years. Android applications run on mobile devices that have limited memory resources. Although Android has its own memory manager with garbage collection support, many applications currently suffer from memory leak vulnerabilities. These applications may crash due to out of memory error while running, and this will lead a bad user experience. The target of our work is static object reference analysis, then we can roughly find whether an application has memory leak bugs, explain the reason of a memory leak problem. After that, we can discovery the location of leak bugs and solve them finally.
引用
收藏
页码:1023 / 1027
页数:5
相关论文
共 9 条
[1]  
Amalfitano D, 2012, IEEE INT CONF AUTOM, P258, DOI 10.1145/2351676.2351717
[2]  
[Anonymous], 2009, Technical Report CS-TR-4991
[3]  
Azim T., 2013, ACM SIGPLAN C OBJ OR
[4]  
Chin E., 2011, 9 INT C MOBILE SYSTE, P239, DOI DOI 10.1145/1999995.2000018
[5]  
Desnos A., 2011, P BLACK HAT AB DHAB
[6]   An automated approach for identifying potential vulnerabilities in software [J].
Ghosh, AK ;
O'Connor, T ;
McGraw, G .
1998 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1998, :104-114
[7]  
Kim H, 2008, 10TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III, P1304
[8]  
Xu GQ, 2008, ICSE'08 PROCEEDINGS OF THE THIRTIETH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, P151, DOI 10.1145/1368088.1368110
[9]  
Zheng C., 2012, Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices, P93, DOI DOI 10.1145/2381934.2381950