登录 | 注册 | 充值 | 退出 | 公司首页 | 繁体中文 | 满意度调查
综合馆
利用虚拟化平台进行内存泄露探测
参考文献
  • [1] Xie Yichen;Aiken Alex. Context-and path-sensitive memory leak detection. Lisbon,Portugal, 2005
  • [2] Jones S T;Arpaci-Dusseau A C;Arpaei-Dusseau R H. VMM-based hidden process detection and identification using Lycosid. Seattle,USA, 2008
  • [3] Rational Purify. Purify:Fast Detection of Memory Leaks and Access Errors. http://www.ibm.com/software/awdtools/purify/
  • [4] . http://www.nongnu.org/qemu/
  • [5] Tsai T;Vaidyanathan K;Gross K. Low-overhead run-time memory leak detection and recovery. Riverside,USA, 2006
  • [6] Qin Feng;Lu Shan;Zhou Yuanyuan. SafeMem:Exploiting ECC-memory for detecting memory leaks and memory corruption during production runs. San Francisco,CA,USA, 2005
  • [7] Bungale Prashanth P;Luk Chi-Keung. PinOS:A programmable framework for whole-system dynamic instrumentation. San Diego,California,USA, 2007
  • [8] Waldspurger Carl A. Memory resource management in VMware ESX server. Boston,USA, 2002
  • [9] Barham P. Xen and the Art of virtualization. New York,USA, 2003
  • [10] Neiger G. Intel virtualization technology:Hardware support for efficient processor virtualization. Intel Technology Journal, 2006,03
  • [11] Michael Viable. Scalability,fidelity,and containment in the potemkin virtual honeyfarm. Brighton,United Kingdom, 2005
  • [12] AMD. AMD-VTM Ncsted Paging. Issue Date:July, 2008
查看更多︾
相似文献 查看更多>>
18.232.53.231