Fast memory debugger for large software projects

Yury Gribov, Maria Guseva, Andrey Ryabinin, JaeOok Kwon, SeungHoon Lee, HakBong Lee, ChungKi Woo


C/C++ programs often suffer from memory corruption bugs. Over the years, numerous tools were developed to help with their detection. A recent addition is AddressSanitizer (ASan) - an extraordinarily fast runtime checker with a good coverage of various types of bugs.

This paper describes our experience in integration of ASan technology into large-scale software products: Tizen distribution and Linux kernel. The tool has already found around a hundred of serious memory bugs in various Tizen applications and in mainline Linux kernel

Full Text:



D. A. Wheeler, "How to Prevent the next Heartbleed," 29 April 2014. [Online]. Available:

K. Serebryany, "AddressSanitizer: A Fast Address Sanity Checker," in USENIX, 2012.

K. Serebryany, "Comparison of Memory Tools," 04 July 2014. [Online]. Available:

H. Boeck, "How Heartbleed could've been found," 7 April 2015. [Online]. Available:

J. S. Nicholas Nethercote, "How to Shadow Every Byte of Memory Used by a Program," in Proceedings of the 3rd international conference on Virtual execution environments, 2007.

"Tizen on Wikipedia," 18 July 2015. [Online]. Available:

"Zram on Wikipedia," [Online]. Available:

B.P. Miller, L. Fredriksen, and B. So, "An Empirical Study of the Reliability of UNIX Utilities," in Communications of the ACM 33, 1990.

X. Chen, "MemBrush: A practical tool to detect custom memory allocators in C binaries," in 20th Working Conference on Reverse Engineering, Koblenz, 2013.

M. Larabel, "KernelASan: Bringing Address Sanitizer To The Linux Kernel," 18 July 2014. [Online]. Available:


  • There are currently no refbacks.

Abava  Absolutech Convergent 2020

ISSN: 2307-8162