Detection method and apparatus for memory leak bug

A memory leak and detection method technology, applied in software testing/debugging, platform integrity maintenance, etc., can solve the problem of low detection accuracy, and achieve the effect of accurately detecting memory leak vulnerabilities

Active Publication Date: 2016-03-02
TENCENT TECH (SHENZHEN) CO LTD
View PDF4 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The technology described in this patented describes how an operating system can automatically check if there are any holes or weaknesses that may allow certain types of content (such as images) from being copied onto other devices). This helps prevent damage during copying operations without having access to sensitive areas where important files were stored.

Problems solved by technology

Technological Problem: Current methods are unable to accurately identify when memories have leaks without having access through their own functions like accessing external devices. Additionally, they require complex operations involving multiple layers of software stacks which makes testing more difficult than necessary.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detection method and apparatus for memory leak bug
  • Detection method and apparatus for memory leak bug
  • Detection method and apparatus for memory leak bug

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0024] According to an embodiment of the present invention, an embodiment of a detection method for a memory leak vulnerability is provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be implemented in a computer system such as a set of computer-executable instructions and, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0025] Optionally, in this embodiment, the above picture transmission method can be applied to figure 2 In the hardware environment formed by the first terminal 101 shown. Such as figure 2 As shown, the first terminal may be connected to the second terminal 102 through a network or a data line, and upload or download data to the second terminal 102 .

[0026] The above-mentioned network includes but not limited to: wide area network, metropolitan area network or local area network. In th

Embodiment 2

[0090] According to an embodiment of the present invention, there is also provided a detection device for implementing the above-mentioned memory leak vulnerability, such as Figure 8 As shown, the device may include: an acquisition module 50 , a drawing module 70 , a first judgment module 90 and a first determination module 80 .

[0091] Among them, the obtaining module is used to obtain the currently selected memory object record in the memory data, wherein the memory data is the data generated when the application program on the terminal is used in the memory record of the terminal, and the memory data includes one or more memory object records The drawing module is used to draw the object picture indicated by the currently selected memory object record in the predetermined display area; the first judging module is used to judge whether the object picture exists in the cache of the terminal, or whether the object picture is an application program The picture displayed on the c

Embodiment 3

[0121] The embodiment of the present invention also provides a terminal or a server. Optionally, in this embodiment, the terminal above can execute the method for detecting a memory leak vulnerability, and the device for detecting a memory leak vulnerability in the above embodiment can be set on the terminal or the server.

[0122] Figure 9 is a structural block diagram of a terminal according to an embodiment of the present invention. Such as Figure 9 As shown, the terminal 200 may include: one or more (only one is shown in the figure) processor 201, memory 203, and transmission device 205, such as Figure 9 As shown, the terminal may also include an input and output device 207 and an antenna 209 .

[0123] Among them, the memory 203 can be used to store software programs and modules, such as program instructions / modules corresponding to the method and device for detecting memory leaks in the embodiments of the present invention, and the processor 201 runs the software pr

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a detection method and apparatus for a memory leak bug. The method comprises: obtaining a memory object record currently selected in memory data, wherein the memory data are recorded by a memory of a terminal and generated during use of an application in the terminal, and the memory data comprise one or more memory object records; drawing an object picture indicated by the currently selected memory object record in a predetermined display region; judging whether the object picture is stored in a cache of the terminal or the object picture is displayed by a current interface of the application to obtain a judgment result; and determining whether the application has the memory leak bug or not by using the judgment result. Through embodiments of the invention, the problem of low detection accuracy of detecting a memory leak bug by querying code logic of a picture object in the prior art is solved, so that the effect of accurately detecting the memory leak bug generated by the picture is achieved.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products