Memory and Resource Leak Defects and Their Repairs in Java ProjectsJ1
Diagnosis of memory and resource leaks is regarded as one of the most significant challenges for software developers [1]. Many academic studies, tools, and language features address this challenge and propose techniques for avoidance, diagnosis, and repair of leak-related bugs (with certain emphasis on memory leaks). Evaluation, comparison, and improvement of these techniques can be demanding due to the high effort of reproducing real-world bugs, lack of common benchmarks, and limited knowledge of the characteristics and the distribution of these issues. Thus, a comprehensive data set and empirically grounded understanding of the properties of leak-inducing defects, how the leaks manifest, and how they are repaired can greatly support the progress in this domain. To this end, we conducted a comprehensive empirical study on 491 real-world memory and resource leak defects collected from issue trackers of 15 open-source Java applications. We analyzed a large number of aspects of the collected issues and their repair patches ranging from distribution of leak types to common repair patterns found in patches. Our study significantly complements previous work [2, 3] and expands the research body of empirical studies in terms of detection types, root causes, and repair types of leak-related defects in Java. Our findings and conclusions can be of relevance for designing approaches and tools for diagnosis of leak-related defects, for debugging practices, and for automated repair approaches.
Fri 10 JulDisplayed time zone: (UTC) Coordinated Universal Time change
08:05 - 09:05 | I23-Code Artifact AnalysisJournal First / Technical Papers at Goguryeo Chair(s): Benoit Baudry KTH Royal Institute of Technology | ||
08:05 12mTalk | Conquering the Extensional Scalability Problem for Value-Flow Analysis FrameworksTechnical Technical Papers Qingkai Shi The Hong Kong University of Science and Technology, Rongxin Wu Department of Cyber Space Security, Xiamen University, Gang Fan Hong Kong University of Science and Technology, Charles Zhang The Hong Kong University of Science and Technology | ||
08:17 12mTalk | Pipelining Bottom-up Data Flow AnalysisTechnical Technical Papers Qingkai Shi The Hong Kong University of Science and Technology, Charles Zhang The Hong Kong University of Science and Technology | ||
08:29 8mTalk | An Empirical Validation of Oracle ImprovementJ1 Journal First Gunel Jahangirova Università della Svizzera italiana, David Clark University College London, Mark Harman , Paolo Tonella Università della Svizzera italiana | ||
08:37 8mTalk | Is Static Analysis Able to Identify Unnecessary Source Code?J1 Journal First Roman Haas CQSE GmbH, Rainer Niedermayr CQSE GmbH, Tobias Roehm CQSE GmbH, Sven Apel Saarland University Pre-print | ||
08:45 8mTalk | Memory and Resource Leak Defects and Their Repairs in Java ProjectsJ1 Journal First Mohammadreza Ghanavati Heidelberg University, Diego Costa Concordia University, Canada, Janos Seboek Heidelberg University, David Lo Singapore Management University, Artur Andrzejak Heidelberg University | ||
08:53 8mTalk | Towards Understanding and Detecting Fake Reviews in App StoresJ1 Journal First |