An Automated Approach of Detection of Memory Leaks for Remote Server Controllers
Memory leaks are a major concern to the long running applications like servers which make the working set to grow with the program. This eventually leads to system crashing. This paper discusses a staged approach to detect leaks in firmware of remote server controller. Remote server controller monit...
Saved in:
Published in | Emitter : International Journal of Engineering Technology Vol. 8; no. 2; pp. 477 - 494 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Politeknik Elektronika Negeri Surabaya
01.12.2020
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Memory leaks are a major concern to the long running applications like servers which make the working set to grow with the program. This eventually leads to system crashing. This paper discusses a staged approach to detect leaks in firmware of remote server controller. Remote server controller monitors the server remotely with many processes running in the background. Any memory leak in the long running applications pose a threat to the performance of the system. The approach adopted here filters the processes running in the system with leaks based on time threshold in the first stage. These processes with leaks are passed to the next stage where precise memory leak detection is done using the open source dynamic instrumentation tool Valgrind. The system leverages an automated leak detection approach that invokes the leak detection process on encountering any severity in the system and generates a consolidated leak report. The proposed approach has less impact on the performance of the system and is faster compared to many available systems as there is no need to modify or re-compile the program. In addition, the automated approach offers an effective technique for detecting possible leakages in early software development phases. |
---|---|
AbstractList | Memory leaks are a major concern to the long running applications like servers which make the working set to grow with the program. This eventually leads to system crashing. This paper discusses a staged approach to detect leaks in firmware of remote server controller. Remote server controller monitors the server remotely with many processes running in the background. Any memory leak in the long running applications pose a threat to the performance of the system. The approach adopted here filters the processes running in the system with leaks based on time threshold in the first stage. These processes with leaks are passed to the next stage where precise memory leak detection is done using the open source dynamic instrumentation tool Valgrind. The system leverages an automated leak detection approach that invokes the leak detection process on encountering any severity in the system and generates a consolidated leak report. The proposed approach has less impact on the performance of the system and is faster compared to many available systems as there is no need to modify or re-compile the program. In addition, the automated approach offers an effective technique for detecting possible leakages in early software development phases. |
Author | Bhavana D Veena M B Santosh Kumar Sahu |
Author_xml | – sequence: 1 surname: Bhavana D fullname: Bhavana D – sequence: 2 surname: Veena M B fullname: Veena M B – sequence: 3 surname: Santosh Kumar Sahu fullname: Santosh Kumar Sahu |
BookMark | eNo9kMtOwzAQRS1UJErpB7DzD6SMYzuxl1V5VSoC8ZDYWY4zgZQkrhxTqX9P-hCruXMXR7rnkow63yEh1wxmqQDgN9jWMWKYbVWdzqSEMzJOheAJY5kaDZlLmXDNPi_ItO_XAMB0CkLqMXmZd3T-G31rI5Z0vtkEb9039RW9xYgu1r7bP0_Y-rCjK7Q_Pa18oK9DEZG-YdhioAvfxeCbBkN_Rc4r2_Q4Pd0J-bi_e188Jqvnh-Vivkoc0zwmpciU1oI5VMgyK7m0AE64khe5ynOHXMgsRxAgcpEhWlEAIgIveJZCCXxClkdu6e3abELd2rAz3tbmUPjwZWyItWvQVKlTw2bnUiEF2LJQOq-gErZgUmklBxY7slzwfR-w-ucxMAfD5mTY7A2bwTD_A2pFcl8 |
Cites_doi | 10.1145/2568225.2568311 10.1109/ICSE.2019.00025 10.1145/1134285.1134321 10.1109/ETFA.2014.7005223 10.1145/1273442.1250746 10.1145/1037949.1024412 10.1145/1273442.1250789 10.1109/TSE.2014.2302311 10.1145/1806799.1806874 10.1016/j.ress.2017.05.019 |
ContentType | Journal Article |
DBID | AAYXX CITATION DOA |
DOI | 10.24003/emitter.v8i2.550 |
DatabaseName | CrossRef Directory of Open Access Journals |
DatabaseTitle | CrossRef |
DatabaseTitleList | CrossRef |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 2443-1168 |
EndPage | 494 |
ExternalDocumentID | oai_doaj_org_article_f2c8000cc24540adb897f0f4ab158985 10_24003_emitter_v8i2_550 |
GroupedDBID | AAYXX ADBBV ALMA_UNASSIGNED_HOLDINGS BCNDV CITATION GROUPED_DOAJ RIG |
ID | FETCH-LOGICAL-c193t-d4689941ce8e16a535a00c4cd3b7877ce34567e0404746eea4b0eee03b3620d03 |
IEDL.DBID | DOA |
ISSN | 2355-391X |
IngestDate | Tue Oct 22 15:04:49 EDT 2024 Fri Aug 23 02:19:14 EDT 2024 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 2 |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c193t-d4689941ce8e16a535a00c4cd3b7877ce34567e0404746eea4b0eee03b3620d03 |
OpenAccessLink | https://doaj.org/article/f2c8000cc24540adb897f0f4ab158985 |
PageCount | 18 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_f2c8000cc24540adb897f0f4ab158985 crossref_primary_10_24003_emitter_v8i2_550 |
PublicationCentury | 2000 |
PublicationDate | 2020-12-01 |
PublicationDateYYYYMMDD | 2020-12-01 |
PublicationDate_xml | – month: 12 year: 2020 text: 2020-12-01 day: 01 |
PublicationDecade | 2020 |
PublicationTitle | Emitter : International Journal of Engineering Technology |
PublicationYear | 2020 |
Publisher | Politeknik Elektronika Negeri Surabaya |
Publisher_xml | – name: Politeknik Elektronika Negeri Surabaya |
References | 5340 5330 5331 5332 5333 5334 5335 5336 5337 5338 5328 5339 5329 |
References_xml | – ident: 5335 doi: 10.1145/2568225.2568311 – ident: 5340 doi: 10.1109/ICSE.2019.00025 – ident: 5330 doi: 10.1145/1134285.1134321 – ident: 5336 doi: 10.1109/ETFA.2014.7005223 – ident: 5331 doi: 10.1145/1273442.1250746 – ident: 5333 doi: 10.1145/1037949.1024412 – ident: 5329 doi: 10.1145/1273442.1250789 – ident: 5337 doi: 10.1109/TSE.2014.2302311 – ident: 5332 doi: 10.1145/1806799.1806874 – ident: 5338 – ident: 5339 – ident: 5328 doi: 10.1016/j.ress.2017.05.019 – ident: 5334 |
SSID | ssj0001920459 ssib036247640 ssib044735755 |
Score | 2.1876097 |
Snippet | Memory leaks are a major concern to the long running applications like servers which make the working set to grow with the program. This eventually leads to... |
SourceID | doaj crossref |
SourceType | Open Website Aggregation Database |
StartPage | 477 |
SubjectTerms | Firmware Memcheck Memory leak Remote Server Controller Valgrind tool |
Title | An Automated Approach of Detection of Memory Leaks for Remote Server Controllers |
URI | https://doaj.org/article/f2c8000cc24540adb897f0f4ab158985 |
Volume | 8 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LS8NAEF6kJz2IT6wv9uBJSLvZ7CM5xmopoiJiobewu5lAfaRSU8F_72wSNTcvHrOEJXyzj2_IN98QcgYqEpI5Ewjj8kBwVgRW8yLQhXVK2kSzvFZb3KnJVFzP5KzT6strwhp74Aa4YcEdchrmHPdecSa3caILVghjQxknceNeypJOMoUrCU9lodWvi4nwDXZ1W4H51PAa5DJJ3XlOyiBKwlnzy9NLKqMhvM59Lc3gI57zgfQ1-Z1Lq-PtX19C4y2y2bJHmjZfvU3WoNwhGx1PwV1yn5Y0XVULZKKQ07S1DKeLgl5CVeuuSv9w6xW2n_QGzPM7ReJKH3CgAurPDljSUaNgf0FyuEem46vH0SRo2yYEDtlYFeRCYRIlQgcxhMrISBrET7g8srg7tQOMjtKAu1dooQCMsAwAWGQRNgxNtE965aKEA0IxVTWK81y62IiYWauBR9aECQinVGL75Pwbl-ytccfIMKuoQcxaEDMPYoYg9smFR-7nRW9sXQ9guLM23Nlf4T78j0mOyDr3aXOtSjkmvWq5ghPkFpU9rZfRFx9yx8w |
link.rule.ids | 315,783,787,867,2109,27936,27937 |
linkProvider | Directory of Open Access Journals |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+Automated+Approach+of+Detection+of+Memory+Leaks+for+Remote+Server+Controllers&rft.jtitle=Emitter+%3A+International+Journal+of+Engineering+Technology&rft.au=Bhavana+D&rft.au=Veena+M+B&rft.au=Santosh+Kumar+Sahu&rft.date=2020-12-01&rft.issn=2355-391X&rft.eissn=2443-1168&rft.spage=477&rft.epage=494&rft_id=info:doi/10.24003%2Femitter.v8i2.550&rft.externalDBID=n%2Fa&rft.externalDocID=10_24003_emitter_v8i2_550 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2355-391X&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2355-391X&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2355-391X&client=summon |