File Download

There are no files associated with this item.

  • Find it @ UNIST can give you direct access to the published full text of this article. (UNISTARs only)

Views & Downloads

Detailed Information

Cited time in webofscience Cited time in scopus
Metadata Downloads

Full metadata record

DC Field Value Language
dc.citation.endPage 625 -
dc.citation.number 8 -
dc.citation.startPage 605 -
dc.citation.title SOFTWARE-PRACTICE & EXPERIENCE -
dc.citation.volume 40 -
dc.contributor.author Jeong, Jinkyu -
dc.contributor.author Seo, Euiseong -
dc.contributor.author Choi, Jeonghwan -
dc.contributor.author Kim, Hwanju -
dc.contributor.author Jo, Heeseung -
dc.contributor.author Lee, Joonwon -
dc.date.accessioned 2023-12-22T07:07:23Z -
dc.date.available 2023-12-22T07:07:23Z -
dc.date.created 2013-06-18 -
dc.date.issued 2010-07 -
dc.description.abstract Memory leaks are a continuing problem in the software developed with programming languages, such as C and C++. A recent approach adopted by some researchers is to tolerate leaks in the software application and to reclaim the leaked memory by use of specially constructed memory allocation routines. However, such routines replace the usual general-purpose memory allocator and tend to be less efficient in speed and in memory utilization. We propose a new scheme which coexists with the existing memory allocation routines and which reclaims memory leaks. Our scheme identifies and reclaims leaked memory at the kernel level. There are some major advantages to our approach: (I) the application software does not need to be modified; (2) the application does not need to be suspended while leaked memory is reclaimed; (3) a remote host can be used to identify the leaked memory, thus minimizing impact on the application program's performance; and (4) our scheme does not degrade the service availability of the application while detecting and reclaiming memory leaks. We have implemented a prototype that works with the GNU C library and with the Linux kernel. Our prototype has been tested and evaluated with various real-world applications. Our results show that the computational overhead of our approach is around 2% of that incurred by the conventional memory allocator in terms of throughput and average response time. We also verified that the prototype successfully suppressed address space expansion caused by memory leaks when the applications are run on synthetic workloads. -
dc.identifier.bibliographicCitation SOFTWARE-PRACTICE & EXPERIENCE, v.40, no.8, pp.605 - 625 -
dc.identifier.doi 10.1002/spe.970 -
dc.identifier.issn 0038-0644 -
dc.identifier.scopusid 2-s2.0-77956380963 -
dc.identifier.uri https://scholarworks.unist.ac.kr/handle/201301/3635 -
dc.identifier.url http://www.scopus.com/inward/record.url?partnerID=HzOxMe3b&scp=77956380963 -
dc.identifier.wosid 000280044400002 -
dc.language 영어 -
dc.publisher JOHN WILEY & SONS LTD -
dc.title KAL: kernel-assisted non-invasive memory leak tolerance with a general-purpose memory allocator -
dc.type Article -
dc.relation.journalWebOfScienceCategory Computer Science, Software Engineering -
dc.relation.journalResearchArea Computer Science -
dc.description.journalRegisteredClass scie -
dc.description.journalRegisteredClass scopus -

qrcode

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.