Memory corruption detecting method using static variables and dynamic memory usage

Jihyun Park, Changsun Park, Byoungju Choi, Gihun Chang

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

Memory fault detection has been continuously studied and various detection methods exist. However, there are still remains many memory defects that are difficult to debug. Memory corruption is one of those defects that often cause a system crash. However, there are many cases where the location of the crash is different from the actual location causing the actual memory corruption. These defects are difficult to solve by existing methods. In this paper, we propose a method to detect real time memory defects by using static global variables derived from execution binary file and dynamic memory usage obtained by tracing memory related functions. We implemented the proposed method as a tool and applied it to the application running on the IoTivity platform. Our tool detects defects very accurately with low overhead even for those whose detected location and the location of its cause are different.

Original languageEnglish
Title of host publicationProceedings 2018 ACM/IEEE 13th International Workshop on Automation of Software Test, AST 2018
PublisherIEEE Computer Society
Pages46-52
Number of pages7
ISBN (Electronic)9781450357432
DOIs
StatePublished - 28 May 2018
Event13th ACM/IEEE International Workshop on Automation of Software Test, AST 2018 - Gothenburg, Sweden
Duration: 28 May 201829 May 2018

Publication series

NameProceedings - International Conference on Software Engineering
ISSN (Print)0270-5257

Conference

Conference13th ACM/IEEE International Workshop on Automation of Software Test, AST 2018
Country/TerritorySweden
CityGothenburg
Period28/05/1829/05/18

Bibliographical note

Publisher Copyright:
© 2018 ACM.

Keywords

  • memory corruption
  • memory fault detection
  • runtime fault detection

Fingerprint

Dive into the research topics of 'Memory corruption detecting method using static variables and dynamic memory usage'. Together they form a unique fingerprint.

Cite this