TY - GEN
T1 - Two-phase online memory leak detection
AU - Liang, Jui Shan
AU - Kao, Hung Wei
AU - Tsao, Han Ching
AU - Chang, Shao Chen
AU - Tsai, Meng Hsun
AU - Li, Kuan Hsien
AU - Sung, Yingrong Coral
PY - 2012
Y1 - 2012
N2 - Memory leaks generated by a running program may exhaust memory resources and degrade system performance. It is hard to reproduce these kinds of leaks, let alone to identify and fix them early in the development phase. Thus online memory leak detection is required. In this paper we propose a two-phase approach to the online memory leak detection problem for Java programs. In phase one (offline analysis), the user executes the investigated program for a while and analyzes its heap with the proposed agent. The agent then summarizes the total occupied bytes of data structures in the heap offline, and the user is then able to select classes whose object instances seem to be potential leaks by examining the total occupied bytes summary. In phase two (online monitoring), to reduce the space and time overhead at runtime, the agent monitors online the objects of selected classes instead of monitoring all objects in the heap. The approach reports the last accessed time and location (including the source file name and the line number) of each leak candidate, with which the user can identify and fix leaks in the program.
AB - Memory leaks generated by a running program may exhaust memory resources and degrade system performance. It is hard to reproduce these kinds of leaks, let alone to identify and fix them early in the development phase. Thus online memory leak detection is required. In this paper we propose a two-phase approach to the online memory leak detection problem for Java programs. In phase one (offline analysis), the user executes the investigated program for a while and analyzes its heap with the proposed agent. The agent then summarizes the total occupied bytes of data structures in the heap offline, and the user is then able to select classes whose object instances seem to be potential leaks by examining the total occupied bytes summary. In phase two (online monitoring), to reduce the space and time overhead at runtime, the agent monitors online the objects of selected classes instead of monitoring all objects in the heap. The approach reports the last accessed time and location (including the source file name and the line number) of each leak candidate, with which the user can identify and fix leaks in the program.
UR - http://www.scopus.com/inward/record.url?scp=84871650769&partnerID=8YFLogxK
U2 - 10.1109/APNOMS.2012.6356092
DO - 10.1109/APNOMS.2012.6356092
M3 - Conference contribution
AN - SCOPUS:84871650769
SN - 9781467344944
T3 - 14th Asia-Pacific Network Operations and Management Symposium: "Management in the Big Data and IoT Era", APNOMS 2012 - Final Program
BT - 14th Asia-Pacific Network Operations and Management Symposium
T2 - 14th Asia-Pacific Network Operations and Management Symposium: "Management in the Big Data and IoT Era", APNOMS 2012
Y2 - 25 September 2012 through 27 September 2012
ER -