Memory leak detection in IoT program based on an abstract memory model SeqMM

Y Dong, W Yin, S Wang, L Zhang, L Sun - IEEE Access, 2019 - ieeexplore.ieee.org
With the rapid growth of the Internet-of-Things (IoT), security issues for the IoT are becoming
increasingly serious. Memory leaks are a common and harmful software defect for IoT …

Precise interprocedural side-effect analysis

M Geffken, H Saffrich, P Thiemann - International Colloquium on …, 2014 - Springer
A side-effect analysis computes for each program phrase a set of memory locations that may
be read or written to when executing this phrase. Our analysis expresses abstract objects …

TwAS: two-stage shape analysis for speed and precision

A Karkare - Proceedings of the 33rd Annual ACM Symposium on …, 2018 - dl.acm.org
A major drawback of shape analysis techniques is the trade-off between speed and
precision. We present TwAS: a novel method to combine two shape analysis techniques-a …

Heap dependence analysis for sequential programs

B Basak, S Dasgupta, A Karkare - Applications, Tools and …, 2012 - ebooks.iospress.nl
In this paper we demonstrate a novel intra-procedural technique for detecting heap
dependences in sequential programs that use recursive data structures. The novelty of our …

[BOOK][B] User Assisted Data Structure Debugging and Verification

V Singh - 2016 - search.proquest.com
Data structures are one of the most important part of programming. Program faults lead to
corruption of runtime data structures of the program which lead to program failure or worse …

[PDF][PDF] FIELD SENSITIVE SHAPE ANALYSIS: IMPLEMENTATION AND IMPROVEMENTS

PVK Reddy - 2012 - static.cse.iitk.ac.in
Shape Analysis refers to a class of techniques used to analyze heap data structures. Several
algorithms have been proposed in literature about shape analysis. These algorithms differ in …

[CITATION][C] Heap Analysis

H Malik, A Karkare, SK Mohanty - 2013