65 papers:
- MSR-2015-SinhaSDPM #detection #repository #source code
- Detecting and Mitigating Secret-Key Leaks in Source Code Repositories (VSS, DS, PD, RP, SM), pp. 396–400.
- SCAM-2015-GhanavatiA #automation #memory management #testing
- Automated memory leak diagnosis by regression testing (MG, AA), pp. 191–200.
- SCAM-2015-YuSF #named
- LeakTracer: Tracing leaks along the way (HY, XS, WF), pp. 181–190.
- SAC-2015-MongioviGFPT #analysis #approach #data flow #detection #hybrid #java
- Combining static and dynamic data flow analysis: a hybrid approach for detecting data leaks in java applications (MM, GG, AF, GP, ET), pp. 1573–1579.
- ICSE-v1-2015-GaoXMZYZXM #c #source code
- Safe Memory-Leak Fixing for C Programs (QG, YX, YM, LZ, WY, ZZ, BX, HM), pp. 459–470.
- ICSE-v1-2015-LiBBKTARBOM #android #component #detection #named #privacy
- IccTA: Detecting Inter-Component Privacy Leaks in Android Apps (LL, AB, TFB, JK, YLT, SA, SR, EB, DO, PM), pp. 280–291.
- DUXU-DI-2014-ComlekciG #experience
- An Alternative Media Experience: LiveLeak (FÇ, SG), pp. 62–70.
- ICPR-2014-FuscoEM #data analysis #locality #network
- Bad Data Analysis with Sparse Sensors for Leak Localisation in Water Distribution Networks (FF, BE, SM), pp. 3642–3647.
- ICSE-2014-JungLRP #automation #detection #memory management
- Automated memory leak detection for production use (CJ, SL, ER, SP), pp. 825–836.
- ICSE-2014-LeeJP #behaviour #detection #machine learning #memory management #modelling #using
- Detecting memory leaks through introspective dynamic behavior modelling using machine learning (SL, CJ, SP), pp. 814–824.
- CGO-2014-YanXYR #detection #memory management #named
- LeakChecker: Practical Static Memory Leak Detection for Managed Languages (DY, G(X, SY, AR), p. 87.
- ASE-2013-GuoZYZZ #android #detection
- Characterizing and detecting resource leaks in Android applications (CG, JZ, JY, ZZ, YZ), pp. 389–398.
- DAC-2013-FariborziCNCHLLS
- Relays do not leak: CMOS does (HF, FC, RN, IRC, LH, RL, TJKL, VS), p. 4.
- ICSM-2013-SorOTS #approach #detection #machine learning #memory management #statistics #using
- Improving Statistical Approach for Memory Leak Detection Using Machine Learning (VS, PO, TT, SNS), pp. 544–547.
- ICFP-2013-Krishnaswami #functional #higher-order #programming
- Higher-order functional reactive programming without spacetime leaks (NRK), pp. 221–232.
- CGO-2013-PienaarH #javascript #memory management #named #static analysis
- JSWhiz: Static analysis for JavaScript memory leaks (JAP, RH), p. 11.
- ICTSS-2013-VorobyovKS #approach #memory management
- A Dynamic Approach to Locating Memory Leaks (KV, PK, PS), pp. 255–270.
- ISSTA-2013-LiCWX #memory management #validation
- Dynamically validating static memory leak warnings (ML, YC, LW, G(X), pp. 112–122.
- ICSM-2012-QianZ #java #memory management
- Inferring weak references for fixing Java memory leaks (JQ, XZ), pp. 571–574.
- SAC-2012-MannS #android #detection #framework #privacy #static analysis
- A framework for static detection of privacy leaks in android applications (CM, AS), pp. 1457–1462.
- ISSTA-2012-SuiYX #analysis #detection #memory management #using
- Static memory leak detection using full-sparse value-flow analysis (YS, DY, JX), pp. 254–264.
- LICS-2012-Levin #internet #what
- Turing’s Password: What Internet Cannot Leak (LAL), p. 11.
- PLDI-2011-XuBQR #memory management #named
- LeakChaser: helping programmers narrow down causes of memory leaks (G(X, MDB, FQ, AR), pp. 270–282.
- STOC-2011-Ajtai
- Secure computation with information leaking to an adversary (MA), pp. 715–724.
- STOC-2011-LewkoLW #how
- How to leak on key updates (ABL, ML, BW), pp. 725–734.
- EDOC-2011-BalinskyPS #framework
- System Call Interception Framework for Data Leak Prevention (HB, DSP, SJS), pp. 139–148.
- SAC-2011-AccorsiW #modelling #workflow
- Strong non-leak guarantees for workflow models (RA, CW), pp. 308–314.
- FASE-2010-DistefanoF #detection #java #memory management
- Memory Leaks Detection in Java by Bi-abductive Inference (DD, IF), pp. 278–292.
- KDD-2010-MaxwellBR #graph #memory management #mining #using
- Diagnosing memory leaks using graph mining on heap dumps (EKM, GB, NR), pp. 115–124.
- ICSE-2010-ClauseO #memory management #named
- LEAKPOINT: pinpointing the causes of memory leaks (JAC, AO), pp. 515–524.
- ICSE-2010-TorlakC #detection #effectiveness #interprocedural
- Effective interprocedural resource leak detection (ET, SC), pp. 535–544.
- ISMM-2010-PetricekS
- Collecting hollywood’s garbage: avoiding space-leaks in composite events (TP, DS), pp. 53–62.
- PLDI-2009-NovarkBZ #memory management
- Efficiently and precisely locating memory leaks and bloat (GN, EDB, BGZ), pp. 397–407.
- ASPLOS-2009-BondM
- Leak pruning (MDB, KSM), pp. 277–288.
- KDD-2008-ChowGS #detection #privacy #using
- Detecting privacy leaks using corpus-based association rules (RC, PG, JS), pp. 893–901.
- OOPSLA-2008-BondM #memory management
- Tolerating memory leaks (MDB, KSM), pp. 109–126.
- ICSE-2008-XuR #detection #java #memory management #precise #profiling #using
- Precise memory leak detection for java software using container profiling (G(X, AR), pp. 151–160.
- ISMM-2008-JungY #detection #memory management #summary
- Practical memory leak detector based on parameterized procedural summaries (YJ, KY), pp. 131–140.
- ASE-2007-RaysideM #memory management #profiling
- Object ownership profiling: a technique for finding and fixing memory leaks (DR, LM), pp. 194–203.
- SIGMOD-2007-AnciauxBBPS #named #query
- GhostDB: querying visible and hidden data without leaks (NA, MB, LB, PP, DS), pp. 677–688.
- PLDI-2007-CheremPR #analysis #detection #memory management #using
- Practical memory leak detection using guarded value-flow analysis (SC, LP, RR), pp. 480–491.
- POPL-2007-JumpM #detection #garbage collection #memory management #named
- Cork: dynamic memory leak detection for garbage-collected languages (MJ, KSM), pp. 31–38.
- ISMM-2007-NguyenR #detection #memory management #using
- Detecting and eliminating memory leaks using cyclic memory allocation (HHN, MCR), pp. 15–30.
- SAS-2006-OrlovichR #analysis #memory management
- Memory Leak Analysis by Contradiction (MO, RR), pp. 405–424.
- QAPL-2005-BartheRW06 #branch #transaction
- Preventing Timing Leaks Through Transactional Branching Instructions (GB, TR, MW), pp. 33–55.
- QAPL-2005-Siveroni06 #algorithm
- Filling Out the Gaps: A Padding Algorithm for Transforming Out Timing Leaks (IS), pp. 241–257.
- ICSE-2006-HeineL #detection #polymorphism #static analysis
- Static detection of leaks in polymorphic containers (DLH, MSL), pp. 252–261.
- ASPLOS-2006-BondM #detection #encoding #memory management #named #online
- Bell: bit-encoding online memory leak detection (MDB, KSM), pp. 61–72.
- DAC-2005-TiriV #modelling #simulation
- Simulation models for side-channel information leaks (KT, IV), pp. 228–233.
- STOC-2005-DodisS #fault
- Correcting errors without leaking partial information (YD, AS), pp. 654–663.
- ESEC-FSE-2005-XieA #detection #memory management
- Context- and path-sensitive memory leak detection (YX, AA), pp. 115–125.
- HPCA-2005-QinLZ #detection #memory management #named
- SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs (FQ, SL, YZ), pp. 291–302.
- ESOP-2004-Hansen
- A Hardest Attacker for Leaking References (RRH), pp. 310–324.
- ASPLOS-2004-HauswirthC #adaptation #detection #memory management #profiling #statistics #using
- Low-overhead memory leak detection using adaptive statistical profiling (MH, TMC), pp. 156–164.
- PLDI-2003-HeineL #c #c++ #detection #memory management
- A practical flow-sensitive and context-sensitive C and C++ memory leak detector (DLH, MSL), pp. 168–181.
- AdaEurope-2003-BriotGDCW #ada #memory management
- Exposing Memory Corruption and Finding Leaks: Advanced Mechanisms in Ada (EB, FG, RD, DC, PW), pp. 129–141.
- ECOOP-2003-MitchellS #automation #java #lightweight #memory management #named #scalability
- LeakBot: An Automated and Lightweight Tool for Diagnosing Memory Leaks in Large Java Applications (NM, GS), pp. 351–377.
- ECOOP-2001-HirzelDH #detection #garbage collection #liveness #on the
- On the Usefulness of Liveness for Garbage Collection and Leak Detection (MH, AD, ALH), pp. 181–206.
- PEPM-2000-ScholzBF #analysis #detection #memory management #pointer
- Symbolic Pointer Analysis for Detecting Memory Leaks (BS, JB, TF), pp. 104–113.
- POPL-2000-Agat
- Transforming Out Timing Leaks (JA), pp. 40–53.
- CC-2000-ShahamKS #array #automation #java #memory management
- Automatic Removal of Array Memory Leaks in Java (RS, EKK, SS), pp. 50–66.
- ECOOP-1999-PauwS #java #memory management #visualisation
- Visualizing Reference Patterns for Solving Memory Leaks in Java (WDP, GS), pp. 116–134.
- CAV-1997-TurkPP #process #testing #verification
- Verification of a Chemical Process Leak Test Procedure (ALT, STP, GJP), pp. 84–94.
- IWMM-1995-Rojemo #functional #garbage collection #lazy evaluation
- Generational Garbage Collection without Temporary Space Leaks for Lazy Functional Languages (NR), pp. 145–162.
- FPCA-1993-Sparud #garbage collection
- Fixing Some Space Leaks without a Garbage Collector (JS), pp. 117–124.