A STATISTICAL APPROACH FOR IDENTIFYING MEMORY LEAKS IN CLOUD APPLICATIONS

Vladimir Šor, Satish Narayana Srirama

2011

Abstract

This position paper describes the attempt to automate the statistical approach for memory leak detection in JavaTM applications. Proposed system extends the basic statistical memory leak detection method with further intelligence to pinpoint the source of the memory leak in the source code. As the method adds only small overhead in runtime it is designed to be used in production systems and will help detecting memory leaks in production environments without constraint to the source of the leak. Architecture of the proposed approach is intended to use in cloud applications.

References

  1. AppDynamics (2010). Appdynamics home page. http:// www.appdynamics.com/.
  2. AppDynamics (2010). Appdynamics home page. http:// www.appdynamics.com/.
  3. Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R. H., Konwinski, A., Lee, G., Patterson, D. A., Rabkin, A., Stoica, I., and Zaharia, M. (2009). Above the clouds, a berkeley view of cloud computing. Technical report UCB/EECS-2009-28, University of California.
  4. Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R. H., Konwinski, A., Lee, G., Patterson, D. A., Rabkin, A., Stoica, I., and Zaharia, M. (2009). Above the clouds, a berkeley view of cloud computing. Technical report UCB/EECS-2009-28, University of California.
  5. Wily Introscope (2010).
  6. Wily Introscope (2010).
  7. Chen, K. and Chen, J.-B. (2007). Aspect-based instrumentation for locating memory leaks in java programs. In Computer Software and Applications Conference, 2007. COMPSAC 2007. 31st Annual International, volume 2, pages 23 -28.
  8. Chen, K. and Chen, J.-B. (2007). Aspect-based instrumentation for locating memory leaks in java programs. In Computer Software and Applications Conference, 2007. COMPSAC 2007. 31st Annual International, volume 2, pages 23 -28.
  9. Chilimbi, T. M. and Hauswirth, M. (2004). Low-overhead memory leak detection using adaptive statistical profiling. In In Proceedings of the 11th International Conference on Architectural Support for Programming Languages and Operating Systems, pages 156- 164.
  10. Chilimbi, T. M. and Hauswirth, M. (2004). Low-overhead memory leak detection using adaptive statistical profiling. In In Proceedings of the 11th International Conference on Architectural Support for Programming Languages and Operating Systems, pages 156- 164.
  11. Dean, J. and Ghemawat, S. (2004). Mapreduce: Simplified data processing on large clusters. In OSDI'04: Sixth Symposium on Operating System Design and Implementation.
  12. Dean, J. and Ghemawat, S. (2004). Mapreduce: Simplified data processing on large clusters. In OSDI'04: Sixth Symposium on Operating System Design and Implementation.
  13. Dmitriev, M. (2003). Design of jfluid: A profiling technology and tool based on dynamic bytecode instrumentation. Technical report, Sun Microsystems Laboratories.
  14. Dmitriev, M. (2003). Design of jfluid: A profiling technology and tool based on dynamic bytecode instrumentation. Technical report, Sun Microsystems Laboratories.
  15. Formanek, I. and Sporar, G. (2006). Dynamic bytecode instrumentation. Dr. Dobbs Journal, Online.
  16. Formanek, I. and Sporar, G. (2006). Dynamic bytecode instrumentation. Dr. Dobbs Journal, Online.
  17. Jump, M. and McKinley, K. S. (2007). Cork: dynamic memory leak detection for garbage-collected languages. In Proceedings of the 34th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages, POPL 7807, pages 31-38, New York, NY, USA. ACM.
  18. Jump, M. and McKinley, K. S. (2007). Cork: dynamic memory leak detection for garbage-collected languages. In Proceedings of the 34th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages, POPL 7807, pages 31-38, New York, NY, USA. ACM.
  19. Maxwell, E. K. (2010). Graph mining algorithms for memory leak diagnosis and biological database clustering. Master's thesis, Virginia Polytechnic Institute and State University.
  20. Maxwell, E. K. (2010). Graph mining algorithms for memory leak diagnosis and biological database clustering. Master's thesis, Virginia Polytechnic Institute and State University.
  21. Sedlacek, J. (2010). Uncovering memory leaks using netbeans profiler. http://netbeans.org/kb/articles/ nb-profiler-uncoveringleaks pt1.html.
  22. Sedlacek, J. (2010). Uncovering memory leaks using netbeans profiler. http://netbeans.org/kb/articles/ nb-profiler-uncoveringleaks pt1.html.
  23. Srirama, S. N., Batrashev, O., and Vainikko, E. (2010). SciCloud: Scientific Computing on the Cloud. In The 10th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing(CCGrid 2010), page 579.
  24. Srirama, S. N., Batrashev, O., and Vainikko, E. (2010). SciCloud: Scientific Computing on the Cloud. In The 10th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing(CCGrid 2010), page 579.
  25. Standard Performance Evaluation Corporation (2008). Specjvm2008. http://www.spec.org/jvm2008/. Verified in Nov. 2010.
  26. Standard Performance Evaluation Corporation (2008). Specjvm2008. http://www.spec.org/jvm2008/. Verified in Nov. 2010.
  27. Sun Microsystems Inc. (2003). Tuning Garbage Collection with the 5.0 JavaTM Virtual Machine.
  28. Sun Microsystems Inc. (2003). Tuning Garbage Collection with the 5.0 JavaTM Virtual Machine.
  29. Sun Microsystems Inc. (2006). JvmTM tool interface. Online.
  30. Sun Microsystems Inc. (2006). JvmTM tool interface. Online.
  31. The Eclipse Foundation (2010). Memory analyzer. Online.
  32. The Eclipse Foundation (2010). Memory analyzer. Online.
  33. The Jikes RVM Project (2010). The jikes rvm project. Online.
  34. The Jikes RVM Project (2010). The jikes rvm project. Online.
  35. Xu, G. and Rountev, A. (2008). Precise memory leak detection for java software using container profiling. In ICSE 7808. ACM/IEEE 30th International Conference on Software Engineering, 2008., pages 151 -160.
  36. Xu, G. and Rountev, A. (2008). Precise memory leak detection for java software using container profiling. In ICSE 7808. ACM/IEEE 30th International Conference on Software Engineering, 2008., pages 151 -160.
Download


Paper Citation


in Harvard Style

Šor V. and Narayana Srirama S. (2011). A STATISTICAL APPROACH FOR IDENTIFYING MEMORY LEAKS IN CLOUD APPLICATIONS . In Proceedings of the 1st International Conference on Cloud Computing and Services Science - Volume 1: CLOSER, ISBN 978-989-8425-52-2, pages 623-628. DOI: 10.5220/0003389906230628


in Harvard Style

Šor V. and Narayana Srirama S. (2011). A STATISTICAL APPROACH FOR IDENTIFYING MEMORY LEAKS IN CLOUD APPLICATIONS . In Proceedings of the 1st International Conference on Cloud Computing and Services Science - Volume 1: CLOSER, ISBN 978-989-8425-52-2, pages 623-628. DOI: 10.5220/0003389906230628


in Bibtex Style

@conference{closer11,
author={Vladimir Šor and Satish Narayana Srirama},
title={A STATISTICAL APPROACH FOR IDENTIFYING MEMORY LEAKS IN CLOUD APPLICATIONS},
booktitle={Proceedings of the 1st International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,},
year={2011},
pages={623-628},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003389906230628},
isbn={978-989-8425-52-2},
}


in Bibtex Style

@conference{closer11,
author={Vladimir Šor and Satish Narayana Srirama},
title={A STATISTICAL APPROACH FOR IDENTIFYING MEMORY LEAKS IN CLOUD APPLICATIONS},
booktitle={Proceedings of the 1st International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,},
year={2011},
pages={623-628},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003389906230628},
isbn={978-989-8425-52-2},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 1st International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,
TI - A STATISTICAL APPROACH FOR IDENTIFYING MEMORY LEAKS IN CLOUD APPLICATIONS
SN - 978-989-8425-52-2
AU - Šor V.
AU - Narayana Srirama S.
PY - 2011
SP - 623
EP - 628
DO - 10.5220/0003389906230628


in EndNote Style

TY - CONF
JO - Proceedings of the 1st International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,
TI - A STATISTICAL APPROACH FOR IDENTIFYING MEMORY LEAKS IN CLOUD APPLICATIONS
SN - 978-989-8425-52-2
AU - Šor V.
AU - Narayana Srirama S.
PY - 2011
SP - 623
EP - 628
DO - 10.5220/0003389906230628