Heap Space Analysis for Java']Java Bytecode

被引:0
|
作者
Albert, Elvira [1 ]
Genaim, Samir [2 ]
Gomez-Zamalloa, Miguel [1 ]
机构
[1] Univ Complutense Madrid, DSIC, E-28040 Madrid, Spain
[2] Tech Univ Madrid, CLIP, Madrid, Spain
关键词
Heap Space Analysis; Heap Consumption; Low-level Languages; !text type='Java']Java[!/text] Bytecode;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This article presents a heap space analysis for (sequential) Java bytecode. The analysis generates heap space cost relations which define at compile-time the heap consumption of a program as a function of its data size. These relations can be used to obtain upper bounds on the heap space allocated during the execution of the different methods. In addition, we describe how to refine the cost relations, by relying on escape analysis, in order to take into account the heap space that can be safely deallocated by the garbage collector upon exit from a corresponding method. These refined cost relations are then used to infer upper bounds on the active heap space upon methods return. Example applications for the analysis consider inference of constant heap usage and heap usage proportional to the data size (including polynomial and exponential heap consumption). Our prototype implementation is reported and demonstrated by means of a series of examples which illustrate how the analysis naturally encompasses standard data-structures like lists, trees and arrays with several dimensions written in object-oriented programming style.
引用
收藏
页码:105 / +
页数:2
相关论文
共 50 条
  • [21] Reverse execution of Java']Java bytecode
    Cook, JJ
    COMPUTER JOURNAL, 2002, 45 (06): : 608 - 619
  • [22] AUTOMATED TERMINATION ANALYSIS OF JAVA']JAVA BYTECODE BY TERM REWRITING
    Otto, Carsten
    Brockschmidt, Marc
    von Essen, Christian
    Giesl, Juergen
    PROCEEDINGS OF THE 21ST INTERNATIONAL CONFERENCE ON REWRITING TECHNIQUES AND APPLICATIONS (RTA'10), 2010, 6 : 259 - 275
  • [23] Removing Useless Variables in Cost Analysis of Java']Java Bytecode
    Albert, E.
    Arenas, P.
    Genaim, S.
    Puebla, G.
    Zanardini, D.
    APPLIED COMPUTING 2008, VOLS 1-3, 2008, : 368 - +
  • [24] Mobile code security by Java']Java bytecode dependence analysis
    Bian, G
    Nakayama, K
    Kobayashi, Y
    Maekawa, M
    IEEE INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES 2004 (ISCIT 2004), PROCEEDINGS, VOLS 1 AND 2: SMART INFO-MEDIA SYSTEMS, 2004, : 923 - 926
  • [25] An Efficient, Parametric Fixpoint Algorithm for Analysis of Java']Java Bytecode
    Mendez, Mario
    Navas, Jorge
    Hermenegildo, Manuel V.
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2007, 190 (01) : 51 - 66
  • [26] Magic-sets transformation for the analysis of Java']Java bytecode
    Payet, Etienne
    Spot, Fausto
    STATIC ANALYSIS, PROCEEDINGS, 2007, 4634 : 452 - +
  • [27] Verified Java']Java Bytecode Verification
    Klein, Gerwin
    IT-INFORMATION TECHNOLOGY, 2005, 47 (02): : 107 - 110
  • [28] Experiments with Non-Termination Analysis for Java']Java Bytecode
    Payet, Etienne
    Spoto, Fausto
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2009, 253 (05) : 83 - 96
  • [29] Estimating the impact of heap liveness information on space consumption in Java']Java
    Shaham, R
    Kolodner, EK
    Sagiv, M
    ACM SIGPLAN NOTICES, 2003, 38 (02) : 171 - 182
  • [30] An Evaluation of Current Java']Java Bytecode Decompilers
    Hamilton, James
    Danicic, Sebastian
    2009 NINTH IEEE INTERNATIONAL WORKING CONFERENCE ON SOURCE CODE ANALYSIS AND MANIPULATION, PROCEEDINGS, 2009, : 129 - 136