期刊文献+

基于对象引用关系的Java程序内存行为分析方法 被引量:3

Memory Behavior Profiling of Java Program Based on Object Reference Relations
下载PDF
导出
摘要 本文提出一种基于对象引用关系的Java程序内存行为分析方法.与传统的通过内存消耗的大小来确定程序中数据结构的重要性并分析相关内存行为的方法不同,本文方法同时考虑内存消耗和内存支配两个因素来确定一个数据结构在程序内存行为中的重要性,通过研究数据结构之间在内存使用上的支配关系和对数据结构进行引用分析,得到程序中重要的内存行为.实验结果表明该方法能有效地分析程序的内存行为,且对比其它方法能提供更加准确的内存行为分析结果. An approach was proposed to analyze the memory behavior of Java programs based on object reference relations. Unlike traditional methods that just consider the factor of memory consumption to find out program 's important data structures and analyze their memory behavior,our approach considers both memory consumption and memory domination to decide whether a data structure is important,and get the important memory behaviors via analyzes the memory dominance relationship between data structures and references analysis. Experimental results showthat the proposed approach is effective,and can get more precise analysis results than other methods.
出处 《电子学报》 EI CAS CSCD 北大核心 2015年第7期1336-1343,共8页 Acta Electronica Sinica
基金 国家自然科学基金(No.61340037) 江苏省333高层次人才培养工程 江苏省高校自然科学研究(No.12KJB520014) 南通市应用研究计划(No.BK2014055) 广西高等学校高水平创新团队及卓越学者计划
关键词 程序理解 内存行为 引用分析 度量策略 program comprehension memory behavior reference analysis measurement strategy
  • 相关文献

参考文献12

  • 1王雷,李吉,李博洋.缓冲区溢出漏洞精确检测方法研究[J].电子学报,2008,36(11):2200-2204. 被引量:5
  • 2Yan D,Xu G,Rountev A.Uncovering performance problems in Java applications with reference propagation profiling[A].Proceedings of the 34th International Conference on Software Engineering[C].Zürich,Switzerland:IEEE,2012.134-144. 被引量:1
  • 3Rayside D,Mendel L.Object ownership profiling:A technique for finding and fixing memory leaks[A].Proceedings of the 22nd International Conference on Automated Software Engineering[C].Atlanta,Georgia,USA:IEEE,2007.194-203. 被引量:1
  • 4Kelley S,Aftandilian E,Gramazio C,et al.Heapviz:Interactive heap visualization for program understanding and debugging[J].Information Visualization,2013,12(2):163-177. 被引量:1
  • 5Mitchell N.The Runtime Structure of Object Ownership[M].Berlin Heidelberg:ECOOP 2006-Object-Oriented Programming,Springer Berlin Heidelberg,2006.74-98. 被引量:1
  • 6Eclipse.MAT[OL].www.eclipse.org/mat/.2014-12-13. 被引量:1
  • 7Reiss S P.Visualizingthe Java heap[A].Proceedings of the 32nd International Conference on Software Engineering[C].Cape Town,South Africa:ICSE,2010.251-254. 被引量:1
  • 8De Pauw W,Sevitsky G.Visualizing Reference Patterns for Solving Memory Leaks in Java[M].Berlin Heidelberg:ECOOP 1999-Object-Oriented Programming.Springer Berlin Heidelberg,1999.116-134. 被引量:1
  • 9Tarjan R.Depth-first search and linear graph algorithms[J].SIAM Journal on Computing,1972,1(2):146-160. 被引量:1
  • 10Blackburn S M,Garner R,Hoffmann C,et al.The DaCapo benchmarks:Java benchmarking development and analysis[A].Proceedings of the 21st Annual ACM SIGPLAN Conference on Object-Oriented Programming Systems,Languages,and Applications[C].Portland,Oregon,USA:ACM,2006.169-190. 被引量:1

二级参考文献19

  • 1G C Necula, S McPeak, W Weimer. CCured: typesafe retrofitting of legacy code [ A ]. ACM SIGPLAN-SIGACT Conference on the Principles of Programming Languages ( POPL ) [ C ]. Portland: ACM Press, 2002.128 - 139. 被引量:1
  • 2U Hermann. Overview of pscan source package [ EB/OL ] http://packages.qa. debian.org/p/pscan.html. 2006 - 11. 被引量:1
  • 3J Viega, J T Bloch, T Kohno, G. McGraw. ITS4: a static vulnerability scanner for C and C + + code [A]. 16th Annual Computer Security Applications Conference[ C]. New Orleans, US: IEEE, 2000.245 - 257. 被引量:1
  • 4D Evans, D Larochelle. Improving security using extensible lightweight static analysis[ J]. IEEE Software, 2002, 19( 1 ) :42 -51. 被引量:1
  • 5U Shankar, K Talwar, J S Foster, D Wagner. Detecting format string vulnerabilities with type qualifiers[ A]. Proc of the 10th USENIX Security Symposium[ C]. Washington, DC: USENIX Association,2001.16 - 16. 被引量:1
  • 6M Zitser, An Evaluation of Static Source Code Analyzers[ D]. Massachusetts Institute of Technology, 2003. 被引量:1
  • 7E Clarke, O Grumberg, D Peled, Model Checking[M]. Massachusetts: The MIT Press, Cambridge, 1999. 被引量:1
  • 8O Lichtenstein, A Pnuefi. Checking that finite state concurrent programs satisfy their linear specification [ A ]. Proceedings of the Twelfth Annual ACM Symposium on Principles of Programming Languages[ C]. New Orleans, US: ACM, 1985.97 - 107. 被引量:1
  • 9D Larochelle, D Evans. Statically detecting likely buffer overflow vulnerabilities [A ]. 2001 USENLX Security Symposium [C] .Washington, DG,2001.13 - 17,177 - 190. 被引量:1
  • 10Matt Conover, w00w00 on Heap Overflows[EB/OL]. http://www. w00w00.org/fdes/articles/heaptut. txt, 1999. 被引量:1

共引文献4

同被引文献28

引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部