{"id":"https://openalex.org/W3123129499","doi":"https://doi.org/10.1109/prdc50213.2020.00028","title":"Risk-Aware Leak Detection at Binary Level","display_name":"Risk-Aware Leak Detection at Binary Level","publication_year":2020,"publication_date":"2020-12-01","ids":{"openalex":"https://openalex.org/W3123129499","doi":"https://doi.org/10.1109/prdc50213.2020.00028","mag":"3123129499"},"language":"en","primary_location":{"id":"doi:10.1109/prdc50213.2020.00028","is_oa":false,"landing_page_url":"https://doi.org/10.1109/prdc50213.2020.00028","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE 25th Pacific Rim International Symposium on Dependable Computing (PRDC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063942093","display_name":"Yuta Koizumi","orcid":"https://orcid.org/0000-0002-1587-331X"},"institutions":[{"id":"https://openalex.org/I114531698","display_name":"Tokyo Institute of Technology","ror":"https://ror.org/0112mx960","country_code":"JP","type":"education","lineage":["https://openalex.org/I114531698"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Yuta Koizumi","raw_affiliation_strings":["Tokyo Institute of Technology"],"affiliations":[{"raw_affiliation_string":"Tokyo Institute of Technology","institution_ids":["https://openalex.org/I114531698"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081304388","display_name":"Yoshitaka Arahori","orcid":"https://orcid.org/0009-0000-7099-6091"},"institutions":[{"id":"https://openalex.org/I114531698","display_name":"Tokyo Institute of Technology","ror":"https://ror.org/0112mx960","country_code":"JP","type":"education","lineage":["https://openalex.org/I114531698"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Yoshitaka Arahori","raw_affiliation_strings":["Tokyo Institute of Technology"],"affiliations":[{"raw_affiliation_string":"Tokyo Institute of Technology","institution_ids":["https://openalex.org/I114531698"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5063942093"],"corresponding_institution_ids":["https://openalex.org/I114531698"],"apc_list":null,"apc_paid":null,"fwci":0.231,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.5239547,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"171","last_page":"180"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10054","display_name":"Parallel Computing and Optimization Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10054","display_name":"Parallel Computing and Optimization Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5880368947982788},{"id":"https://openalex.org/keywords/leak","display_name":"Leak","score":0.5472502112388611},{"id":"https://openalex.org/keywords/binary-number","display_name":"Binary number","score":0.4724954664707184},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.14694109559059143},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.10900643467903137},{"id":"https://openalex.org/keywords/environmental-science","display_name":"Environmental science","score":0.10388615727424622}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5880368947982788},{"id":"https://openalex.org/C2780378346","wikidata":"https://www.wikidata.org/wiki/Q1349983","display_name":"Leak","level":2,"score":0.5472502112388611},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.4724954664707184},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.14694109559059143},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.10900643467903137},{"id":"https://openalex.org/C39432304","wikidata":"https://www.wikidata.org/wiki/Q188847","display_name":"Environmental science","level":0,"score":0.10388615727424622},{"id":"https://openalex.org/C87717796","wikidata":"https://www.wikidata.org/wiki/Q146326","display_name":"Environmental engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/prdc50213.2020.00028","is_oa":false,"landing_page_url":"https://doi.org/10.1109/prdc50213.2020.00028","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE 25th Pacific Rim International Symposium on Dependable Computing (PRDC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1710734607","https://openalex.org/W1991546210","https://openalex.org/W2000100269","https://openalex.org/W2014433051","https://openalex.org/W2072385532","https://openalex.org/W2102674270","https://openalex.org/W2134633067","https://openalex.org/W2144300381","https://openalex.org/W2156858199","https://openalex.org/W2170922286","https://openalex.org/W2295109848","https://openalex.org/W2954121408","https://openalex.org/W2963723316","https://openalex.org/W4210676563","https://openalex.org/W4234825413","https://openalex.org/W4239813889","https://openalex.org/W4245569013","https://openalex.org/W4251369193","https://openalex.org/W6637688222"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2338094139","https://openalex.org/W2390279801","https://openalex.org/W2583782559","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2945751699","https://openalex.org/W2478288626"],"abstract_inverted_index":{"Memory":[0,19],"leak":[1,59,68,117,226],"is":[2,16],"a":[3,7,114,161,214],"problematic":[4],"bug":[5],"that":[6,197,248],"heap":[8],"object":[9],"will":[10],"never":[11],"be":[12,22],"deallocated":[13],"after":[14],"it":[15],"last":[17],"accessed.":[18],"leaks":[20,33,38,100,140,159,207],"can":[21],"classified":[23],"into":[24],"two":[25],"categories":[26],"in":[27,101,160,200,208,213],"terms":[28],"of":[29,76,88,126,138,154,164,217,224,233],"their":[30,105],"risk:":[31],"high-risk":[32,97,139,156,204,225],"and":[34,46,98,157,166,182,189,194,205,222],"low-risk":[35,50,99,158,206],"ones.":[36],"High-risk":[37],"eventually":[39],"induce":[40],"failures":[41],"such":[42],"as":[43],"program":[44],"clashes":[45],"performance":[47],"degradation,":[48],"whereas":[49],"ones":[51],"may":[52],"not":[53,83],"necessarily":[54],"cause":[55],"failures.":[56],"As":[57],"promising":[58],"detectors,":[60],"there":[61],"have":[62,72],"been":[63],"proposed":[64],"growth-sensitive":[65],"or":[66,103],"staleness-sensitive":[67],"detectors.":[69],"However,":[70],"they":[71,81,92],"at":[73,141,210,241],"least":[74],"one":[75],"the":[77,130,135,145,151,174,179,183],"major":[78],"drawbacks:":[79],"(1)":[80,129],"are":[82,108],"applicable":[84],"to":[85,254],"executable":[86],"binaries":[87],"C/C++":[89],"programs,":[90,191],"(2)":[91,144],"cannot":[93],"quickly":[94],"detect":[95],"both":[96,155,203],"distinction,":[102],"(3)":[104,167],"run-time":[106,175,250],"overheads":[107,176,251],"prohibitively":[109],"high.This":[110],"paper":[111],"proposes":[112],"BIGLeak,":[113],"risk-aware,":[115],"efficient":[116],"detector":[118],"based":[119],"on":[120],"dynamic":[121],"binary":[122,142,211,242],"analysis.":[123],"BIGLeak":[124,131,180,198],"consists":[125],"three":[127],"components:":[128],"algorithm,":[132],"which":[133,148,171,239],"enables":[134],"accurate":[136],"detection":[137,227],"level,":[143],"intermittency":[146,184],"analysis,":[147],"allows":[149],"for":[150],"quick":[152],"prediction":[153],"short":[162,215],"period":[163,216],"time,":[165],"context-aware":[168],"execution":[169],"sampling,":[170],"effectively":[172],"reduces":[173],"incurred":[177],"by":[178],"algorithm":[181],"analysis.Experiments":[185],"with":[186],"several":[187],"synthetic":[188],"real":[190],"including":[192],"lighttpd":[193],"postgres,":[195],"show":[196],"succeeded":[199],"accurately":[201],"detecting":[202],"distinction":[209],"level":[212],"time.":[218],"Especially,":[219],"BIGLeak\u2019s":[220,249,257],"precision":[221],"recall":[223],"were":[228,252],"much":[229],"better":[230],"than":[231],"those":[232],"an":[234],"existing":[235],"staleness":[236],"detector,":[237],"SWAT,":[238,255],"works":[240],"level.":[243],"Experimental":[244],"results":[245],"also":[246],"indicate":[247],"comparable":[253],"despite":[256],"accuracy":[258],"outperformed":[259],"SWAT\u2019s.":[260]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
