BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
memori (37)
detect (24)
use (11)
static (7)
analysi (7)

Stem leak$ (all stems)

65 papers:

MSRMSR-2015-SinhaSDPM #detection #repository #source code
Detecting and Mitigating Secret-Key Leaks in Source Code Repositories (VSS, DS, PD, RP, SM), pp. 396–400.
SCAMSCAM-2015-GhanavatiA #automation #memory management #testing
Automated memory leak diagnosis by regression testing (MG, AA), pp. 191–200.
SCAMSCAM-2015-YuSF #named
LeakTracer: Tracing leaks along the way (HY, XS, WF), pp. 181–190.
SACSAC-2015-MongioviGFPT #analysis #approach #data flow #detection #hybrid #java
Combining static and dynamic data flow analysis: a hybrid approach for detecting data leaks in java applications (MM, GG, AF, GP, ET), pp. 1573–1579.
ICSEICSE-v1-2015-GaoXMZYZXM #c #source code
Safe Memory-Leak Fixing for C Programs (QG, YX, YM, LZ, WY, ZZ, BX, HM), pp. 459–470.
ICSEICSE-v1-2015-LiBBKTARBOM #android #component #detection #named #privacy
IccTA: Detecting Inter-Component Privacy Leaks in Android Apps (LL, AB, TFB, JK, YLT, SA, SR, EB, DO, PM), pp. 280–291.
HCIDUXU-DI-2014-ComlekciG #experience
An Alternative Media Experience: LiveLeak (, SG), pp. 62–70.
ICPRICPR-2014-FuscoEM #data analysis #locality #network
Bad Data Analysis with Sparse Sensors for Leak Localisation in Water Distribution Networks (FF, BE, SM), pp. 3642–3647.
ICSEICSE-2014-JungLRP #automation #detection #memory management
Automated memory leak detection for production use (CJ, SL, ER, SP), pp. 825–836.
ICSEICSE-2014-LeeJP #behaviour #detection #machine learning #memory management #modelling #using
Detecting memory leaks through introspective dynamic behavior modelling using machine learning (SL, CJ, SP), pp. 814–824.
CGOCGO-2014-YanXYR #detection #memory management #named
LeakChecker: Practical Static Memory Leak Detection for Managed Languages (DY, G(X, SY, AR), p. 87.
ASEASE-2013-GuoZYZZ #android #detection
Characterizing and detecting resource leaks in Android applications (CG, JZ, JY, ZZ, YZ), pp. 389–398.
DACDAC-2013-FariborziCNCHLLS
Relays do not leak: CMOS does (HF, FC, RN, IRC, LH, RL, TJKL, VS), p. 4.
ICSMEICSM-2013-SorOTS #approach #detection #machine learning #memory management #statistics #using
Improving Statistical Approach for Memory Leak Detection Using Machine Learning (VS, PO, TT, SNS), pp. 544–547.
ICFPICFP-2013-Krishnaswami #functional #higher-order #programming
Higher-order functional reactive programming without spacetime leaks (NRK), pp. 221–232.
CGOCGO-2013-PienaarH #javascript #memory management #named #static analysis
JSWhiz: Static analysis for JavaScript memory leaks (JAP, RH), p. 11.
ICTSSICTSS-2013-VorobyovKS #approach #memory management
A Dynamic Approach to Locating Memory Leaks (KV, PK, PS), pp. 255–270.
ISSTAISSTA-2013-LiCWX #memory management #validation
Dynamically validating static memory leak warnings (ML, YC, LW, G(X), pp. 112–122.
ICSMEICSM-2012-QianZ #java #memory management
Inferring weak references for fixing Java memory leaks (JQ, XZ), pp. 571–574.
SACSAC-2012-MannS #android #detection #framework #privacy #static analysis
A framework for static detection of privacy leaks in android applications (CM, AS), pp. 1457–1462.
ISSTAISSTA-2012-SuiYX #analysis #detection #memory management #using
Static memory leak detection using full-sparse value-flow analysis (YS, DY, JX), pp. 254–264.
LICSLICS-2012-Levin #internet #what
Turing’s Password: What Internet Cannot Leak (LAL), p. 11.
PLDIPLDI-2011-XuBQR #memory management #named
LeakChaser: helping programmers narrow down causes of memory leaks (G(X, MDB, FQ, AR), pp. 270–282.
STOCSTOC-2011-Ajtai
Secure computation with information leaking to an adversary (MA), pp. 715–724.
STOCSTOC-2011-LewkoLW #how
How to leak on key updates (ABL, ML, BW), pp. 725–734.
EDOCEDOC-2011-BalinskyPS #framework
System Call Interception Framework for Data Leak Prevention (HB, DSP, SJS), pp. 139–148.
SACSAC-2011-AccorsiW #modelling #workflow
Strong non-leak guarantees for workflow models (RA, CW), pp. 308–314.
FASEFASE-2010-DistefanoF #detection #java #memory management
Memory Leaks Detection in Java by Bi-abductive Inference (DD, IF), pp. 278–292.
KDDKDD-2010-MaxwellBR #graph #memory management #mining #using
Diagnosing memory leaks using graph mining on heap dumps (EKM, GB, NR), pp. 115–124.
ICSEICSE-2010-ClauseO #memory management #named
LEAKPOINT: pinpointing the causes of memory leaks (JAC, AO), pp. 515–524.
ICSEICSE-2010-TorlakC #detection #effectiveness #interprocedural
Effective interprocedural resource leak detection (ET, SC), pp. 535–544.
ISMMISMM-2010-PetricekS
Collecting hollywood’s garbage: avoiding space-leaks in composite events (TP, DS), pp. 53–62.
PLDIPLDI-2009-NovarkBZ #memory management
Efficiently and precisely locating memory leaks and bloat (GN, EDB, BGZ), pp. 397–407.
ASPLOSASPLOS-2009-BondM
Leak pruning (MDB, KSM), pp. 277–288.
KDDKDD-2008-ChowGS #detection #privacy #using
Detecting privacy leaks using corpus-based association rules (RC, PG, JS), pp. 893–901.
OOPSLAOOPSLA-2008-BondM #memory management
Tolerating memory leaks (MDB, KSM), pp. 109–126.
ICSEICSE-2008-XuR #detection #java #memory management #precise #profiling #using
Precise memory leak detection for java software using container profiling (G(X, AR), pp. 151–160.
ISMMISMM-2008-JungY #detection #memory management #summary
Practical memory leak detector based on parameterized procedural summaries (YJ, KY), pp. 131–140.
ASEASE-2007-RaysideM #memory management #profiling
Object ownership profiling: a technique for finding and fixing memory leaks (DR, LM), pp. 194–203.
SIGMODSIGMOD-2007-AnciauxBBPS #named #query
GhostDB: querying visible and hidden data without leaks (NA, MB, LB, PP, DS), pp. 677–688.
PLDIPLDI-2007-CheremPR #analysis #detection #memory management #using
Practical memory leak detection using guarded value-flow analysis (SC, LP, RR), pp. 480–491.
POPLPOPL-2007-JumpM #detection #garbage collection #memory management #named
Cork: dynamic memory leak detection for garbage-collected languages (MJ, KSM), pp. 31–38.
ISMMISMM-2007-NguyenR #detection #memory management #using
Detecting and eliminating memory leaks using cyclic memory allocation (HHN, MCR), pp. 15–30.
SASSAS-2006-OrlovichR #analysis #memory management
Memory Leak Analysis by Contradiction (MO, RR), pp. 405–424.
QAPLQAPL-2005-BartheRW06 #branch #transaction
Preventing Timing Leaks Through Transactional Branching Instructions (GB, TR, MW), pp. 33–55.
QAPLQAPL-2005-Siveroni06 #algorithm
Filling Out the Gaps: A Padding Algorithm for Transforming Out Timing Leaks (IS), pp. 241–257.
ICSEICSE-2006-HeineL #detection #polymorphism #static analysis
Static detection of leaks in polymorphic containers (DLH, MSL), pp. 252–261.
ASPLOSASPLOS-2006-BondM #detection #encoding #memory management #named #online
Bell: bit-encoding online memory leak detection (MDB, KSM), pp. 61–72.
DACDAC-2005-TiriV #modelling #simulation
Simulation models for side-channel information leaks (KT, IV), pp. 228–233.
STOCSTOC-2005-DodisS #fault
Correcting errors without leaking partial information (YD, AS), pp. 654–663.
ESEC-FSEESEC-FSE-2005-XieA #detection #memory management
Context- and path-sensitive memory leak detection (YX, AA), pp. 115–125.
HPCAHPCA-2005-QinLZ #detection #memory management #named
SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs (FQ, SL, YZ), pp. 291–302.
ESOPESOP-2004-Hansen
A Hardest Attacker for Leaking References (RRH), pp. 310–324.
ASPLOSASPLOS-2004-HauswirthC #adaptation #detection #memory management #profiling #statistics #using
Low-overhead memory leak detection using adaptive statistical profiling (MH, TMC), pp. 156–164.
PLDIPLDI-2003-HeineL #c #c++ #detection #memory management
A practical flow-sensitive and context-sensitive C and C++ memory leak detector (DLH, MSL), pp. 168–181.
AdaEuropeAdaEurope-2003-BriotGDCW #ada #memory management
Exposing Memory Corruption and Finding Leaks: Advanced Mechanisms in Ada (EB, FG, RD, DC, PW), pp. 129–141.
ECOOPECOOP-2003-MitchellS #automation #java #lightweight #memory management #named #scalability
LeakBot: An Automated and Lightweight Tool for Diagnosing Memory Leaks in Large Java Applications (NM, GS), pp. 351–377.
ECOOPECOOP-2001-HirzelDH #detection #garbage collection #liveness #on the
On the Usefulness of Liveness for Garbage Collection and Leak Detection (MH, AD, ALH), pp. 181–206.
PEPMPEPM-2000-ScholzBF #analysis #detection #memory management #pointer
Symbolic Pointer Analysis for Detecting Memory Leaks (BS, JB, TF), pp. 104–113.
POPLPOPL-2000-Agat
Transforming Out Timing Leaks (JA), pp. 40–53.
CCCC-2000-ShahamKS #array #automation #java #memory management
Automatic Removal of Array Memory Leaks in Java (RS, EKK, SS), pp. 50–66.
ECOOPECOOP-1999-PauwS #java #memory management #visualisation
Visualizing Reference Patterns for Solving Memory Leaks in Java (WDP, GS), pp. 116–134.
CAVCAV-1997-TurkPP #process #testing #verification
Verification of a Chemical Process Leak Test Procedure (ALT, STP, GJP), pp. 84–94.
ISMMIWMM-1995-Rojemo #functional #garbage collection #lazy evaluation
Generational Garbage Collection without Temporary Space Leaks for Lazy Functional Languages (NR), pp. 145–162.
FPCAFPCA-1993-Sparud #garbage collection
Fixing Some Space Leaks without a Garbage Collector (JS), pp. 117–124.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.