期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Demand-Driven Memory Leak Detection Based on Flow-and Context-Sensitive Pointer Analysis 被引量:2
1
作者 王戟 马晓东 +2 位作者 董威 徐厚峰 刘万伟 《Journal of Computer Science & Technology》 SCIE EI CSCD 2009年第2期347-356,共10页
We present a demand-driven approach to memory leak detection algorithm based on flow- and context-sensitive pointer analysis. The detection algorithm firstly assumes the presence of a memory leak at some program point... We present a demand-driven approach to memory leak detection algorithm based on flow- and context-sensitive pointer analysis. The detection algorithm firstly assumes the presence of a memory leak at some program point and then runs a backward analysis to see if this assumption can be disproved. Our algorithm computes the memory abstraction of programs based on points-to graph resulting from flow- and context-sensitive pointer analysis. We have implemented the algorithm in the SUIF2 compiler infrastructure and used the implementation to analyze a set of C benchmark programs. The experimental results show that the approach has better precision with satisfied scalability as expected. 展开更多
关键词 flow-sensitive memory leak detection demand-driven static analysis
原文传递
MemHookNet:Real-Time Multi-Class Heap Anomaly Detection with Log Hooking
2
作者 Siyi Wang Yan Zhuang +2 位作者 Zhizhuang Zhou Xinhao Wang Menglan Li 《Computers, Materials & Continua》 2025年第11期3041-3066,共26页
Heap memory anomalies,such as Use-After-Free(UAF),Double-Free,andMemory Leaks,pose critical security threats including system crashes,data leakage,and remote exploits.Existing methods often fail to handle multiple ano... Heap memory anomalies,such as Use-After-Free(UAF),Double-Free,andMemory Leaks,pose critical security threats including system crashes,data leakage,and remote exploits.Existing methods often fail to handle multiple anomaly types and meet real-time detection demands.To address these challenges,this paper proposes MemHookNet,a real-time multi-class heap anomaly detection framework that combines log hooking with deep learning.Without modifying source code,MemHookNet non-intrusively captures memory operation logs at runtime and transforms them into structured sequences encoding operation types,pointer identifiers,thread context,memory sizes,and temporal intervals.A sliding-window Long Short-Term Memory(LSTM)module efficiently filters out suspicious segments,which are then transformed into pointer access graphs for classification using a GATv2-based model.Experimental results demonstrate that MemHookNet achieves 82.2% accuracy and 81.5% recall with an average inference time of 15 ms,outperforming DeepLog and GLAD-PAW by 11.7% in accuracy and reducing latency by over 80%. 展开更多
关键词 Use-after-free detection heapmemory vulnerabilities log analysis memory leak detection graph neural network
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部