{"id":"https://openalex.org/W4410428032","doi":"https://doi.org/10.1109/tse.2025.3571192","title":"Proactive Debugging of Memory Leakage Bugs in Single Page Web Applications","display_name":"Proactive Debugging of Memory Leakage Bugs in Single Page Web Applications","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4410428032","doi":"https://doi.org/10.1109/tse.2025.3571192"},"language":"en","primary_location":{"id":"doi:10.1109/tse.2025.3571192","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tse.2025.3571192","pdf_url":null,"source":{"id":"https://openalex.org/S8351582","display_name":"IEEE Transactions on Software Engineering","issn_l":"0098-5589","issn":["0098-5589","1939-3520","2326-3881"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Software Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5031938049","display_name":"Arooba Shahoor","orcid":"https://orcid.org/0000-0002-7856-5592"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Arooba Shahoor","raw_affiliation_strings":["WithPlaybook, Inc., Seoul, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"WithPlaybook, Inc., Seoul, Republic of Korea","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5117567356","display_name":"Satbek Abdyldayev","orcid":null},"institutions":[{"id":"https://openalex.org/I48566637","display_name":"Ulsan National Institute of Science and Technology","ror":"https://ror.org/017cjz748","country_code":"KR","type":"education","lineage":["https://openalex.org/I48566637"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Satbek Abdyldayev","raw_affiliation_strings":["Department of Computer Science and Engineering, Ulsan National Institute of Science and Technology (UNIST), Ulsan, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Ulsan National Institute of Science and Technology (UNIST), Ulsan, Republic of Korea","institution_ids":["https://openalex.org/I48566637"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055388238","display_name":"Hyesoo Hong","orcid":"https://orcid.org/0009-0008-9982-7943"},"institutions":[{"id":"https://openalex.org/I48566637","display_name":"Ulsan National Institute of Science and Technology","ror":"https://ror.org/017cjz748","country_code":"KR","type":"education","lineage":["https://openalex.org/I48566637"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Hyeongi Hong","raw_affiliation_strings":["Department of Computer Science and Engineering, Ulsan National Institute of Science and Technology (UNIST), Ulsan, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Ulsan National Institute of Science and Technology (UNIST), Ulsan, Republic of Korea","institution_ids":["https://openalex.org/I48566637"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009308931","display_name":"Jooyong Yi","orcid":"https://orcid.org/0000-0002-7215-0855"},"institutions":[{"id":"https://openalex.org/I48566637","display_name":"Ulsan National Institute of Science and Technology","ror":"https://ror.org/017cjz748","country_code":"KR","type":"education","lineage":["https://openalex.org/I48566637"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jooyong Yi","raw_affiliation_strings":["Department of Computer Science and Engineering, Ulsan National Institute of Science and Technology (UNIST), Ulsan, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Ulsan National Institute of Science and Technology (UNIST), Ulsan, Republic of Korea","institution_ids":["https://openalex.org/I48566637"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067772621","display_name":"Dongsun Kim","orcid":"https://orcid.org/0000-0003-0272-6860"},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Dongsun Kim","raw_affiliation_strings":["Department of Computer Science and Engineering, Korea University, Seoul, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Korea University, Seoul, Republic of Korea","institution_ids":["https://openalex.org/I197347611"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5031938049"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.11557789,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"27"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8646568059921265},{"id":"https://openalex.org/keywords/debugging","display_name":"Debugging","score":0.835616946220398},{"id":"https://openalex.org/keywords/memory-leak","display_name":"Memory leak","score":0.6687904596328735},{"id":"https://openalex.org/keywords/software-bug","display_name":"Software bug","score":0.6237542629241943},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.5628165006637573},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.5073792338371277},{"id":"https://openalex.org/keywords/web-page","display_name":"Web page","score":0.4254031181335449},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.38493090867996216},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.33967339992523193},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3373764157295227},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.2626641094684601},{"id":"https://openalex.org/keywords/memory-management","display_name":"Memory management","score":0.2609816789627075},{"id":"https://openalex.org/keywords/semiconductor-memory","display_name":"Semiconductor memory","score":0.10757744312286377}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8646568059921265},{"id":"https://openalex.org/C168065819","wikidata":"https://www.wikidata.org/wiki/Q845566","display_name":"Debugging","level":2,"score":0.835616946220398},{"id":"https://openalex.org/C156731835","wikidata":"https://www.wikidata.org/wiki/Q751740","display_name":"Memory leak","level":4,"score":0.6687904596328735},{"id":"https://openalex.org/C1009929","wikidata":"https://www.wikidata.org/wiki/Q179550","display_name":"Software bug","level":3,"score":0.6237542629241943},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.5628165006637573},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.5073792338371277},{"id":"https://openalex.org/C21959979","wikidata":"https://www.wikidata.org/wiki/Q36774","display_name":"Web page","level":2,"score":0.4254031181335449},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.38493090867996216},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.33967339992523193},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3373764157295227},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.2626641094684601},{"id":"https://openalex.org/C176649486","wikidata":"https://www.wikidata.org/wiki/Q2308807","display_name":"Memory management","level":3,"score":0.2609816789627075},{"id":"https://openalex.org/C98986596","wikidata":"https://www.wikidata.org/wiki/Q1143031","display_name":"Semiconductor memory","level":2,"score":0.10757744312286377},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tse.2025.3571192","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tse.2025.3571192","pdf_url":null,"source":{"id":"https://openalex.org/S8351582","display_name":"IEEE Transactions on Software Engineering","issn_l":"0098-5589","issn":["0098-5589","1939-3520","2326-3881"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Software Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W2078389019","https://openalex.org/W2088505585","https://openalex.org/W2110219362","https://openalex.org/W2122947685","https://openalex.org/W2420464636","https://openalex.org/W2482758090","https://openalex.org/W2795338679","https://openalex.org/W2795866244","https://openalex.org/W2867448323","https://openalex.org/W2898827326","https://openalex.org/W2904214673","https://openalex.org/W2924629359","https://openalex.org/W2998011150","https://openalex.org/W3043761819","https://openalex.org/W3091097332","https://openalex.org/W3094454151","https://openalex.org/W3100698844","https://openalex.org/W3193682477","https://openalex.org/W4206589429","https://openalex.org/W4244284331","https://openalex.org/W4244452926","https://openalex.org/W4255632703","https://openalex.org/W4402457546"],"related_works":["https://openalex.org/W2740264376","https://openalex.org/W4206999239","https://openalex.org/W2161928627","https://openalex.org/W4388482952","https://openalex.org/W2786113878","https://openalex.org/W2727867943","https://openalex.org/W3015562293","https://openalex.org/W4400860681","https://openalex.org/W1978161581","https://openalex.org/W2787155073"],"abstract_inverted_index":{"Developing":[0],"modern":[1],"web":[2,23,45,97],"applications":[3,24,62,98],"often":[4,42,179],"relies":[5],"on":[6,88,100,229],"web-based":[7],"application":[8],"frameworks":[9,18,41],"such":[10,74],"as":[11,39,250,325],"React,":[12],"Vue.js,":[13],"and":[14,28,68,108,137,151,181,192,289],"Angular.":[15],"Although":[16],"the":[17,20,40,89,142,157,162,184,190,197,206,213,227,248,278,283,287,294,317,346],"accelerate":[19],"development":[21],"of":[22,159,208,256,319,323],"with":[25,70,321,335],"several":[26],"useful":[27],"predefined":[29],"components,":[30],"they":[31],"are":[32,58,147,244,270,333],"inevitably":[33],"vulnerable":[34],"to":[35,125,166,170,195,247,265,272],"unmanaged":[36],"memory":[37,79,101,116,128,145,172,198,267,312],"consumption":[38,268],"produce":[43],"monolithic":[44],"pages,":[46],"socalled,":[47],"Single":[48],"Page":[49],"Applications":[50],"(SPAs),":[51],"in":[52,73,81,130,220],"which":[53,104,177],"no":[54],"page":[55],"refresh":[56],"actions":[57],"made":[59],"during":[60],"navigation.Web":[61],"can":[63,84,187,261,307],"be":[64],"alive":[65],"for":[66,96,311],"hours":[67],"days":[69],"behavior":[71,158],"loops,":[72],"cases,":[75],"even":[76],"a":[77,123,135],"single":[78],"leak":[80,102,175,236],"an":[82,160],"SPA":[83],"cause":[85,298],"performance":[86,318],"degradation":[87],"client":[90],"side.":[91],"However,":[92],"recent":[93,222,326],"debugging":[94,139],"techniques":[95],"focus":[99],"detection,":[103,176],"requires":[105],"manual":[106],"tasks":[107],"produces":[109],"imprecise":[110],"results,":[111],"rather":[112,132],"than":[113,133],"proactively":[114,126,167],"repairing":[115],"leaks.":[117,199,313],"<p":[118],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[119],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">We":[120],"propose":[121],"LEAKPAIR,":[122],"technique":[124,163,186,228,243,344],"repair":[127,211,215,337],"leaks":[129,146],"SPAs":[131],"following":[134],"classical":[136],"reactive":[138],"process.":[140],"Given":[141],"insight":[143],"that":[144,259,269,293,305,322,329,342],"mostly":[148],"non-functional":[149],"bugs":[150],"fixing":[152],"them":[153],"might":[154,303],"not":[155,297],"change":[156],"application,":[161],"is":[164,178],"designed":[165],"generate":[168,201,262,308],"patches":[169,239,264,295,310],"fix":[171,196],"leaks,":[173],"without":[174,233],"heavy":[180],"tedious.":[182],"Thus,":[183],"proactive":[185],"significantly":[188],"reduce":[189,266],"time":[191],"effort":[193],"necessary":[194],"To":[200],"effective":[202,263],"patches,":[203,288],"LEAKPAIR":[204,260,306,320],"follows":[205],"idea":[207],"pattern-based":[209],"program":[210,336],"since":[212],"automated":[214],"strategy":[216],"shows":[217],"successful":[218,334],"results":[219,255,340],"many":[221],"studies.":[223],"We":[224],"extensively":[225],"evaluate":[226],"60":[230],"open-source":[231],"projects":[232,249,284],"using":[234],"explicit":[235],"detection.":[237],"The":[238,254],"generated":[240],"by":[241,282],"our":[242,343],"also":[245],"submitted":[246],"pull":[251],"requests":[252],"(PRs).":[253],"PRs":[257],"show":[258,328,341],"acceptable":[271],"developers.":[273],"In":[274],"addition,":[275],"we":[276,315],"execute":[277],"test":[279],"suites":[280],"given":[281],"after":[285],"applying":[286],"it":[290],"turns":[291],"out":[292],"do":[296],"any":[299],"functionality":[300],"breakage;":[301],"this":[302],"imply":[304],"non-intrusive":[309],"Furthermore,":[314],"compare":[316],"GPT-4":[324],"studies":[327],"large":[330],"language":[331,347],"models":[332],"tasks.":[338],"Our":[339],"outperforms":[345],"model.":[348]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
