DroidPerf: Profiling Memory Objects on Android Devices

被引:4
|
作者
Li, Bolun [1 ]
Zhao, Qidong [1 ]
Jiao, Shuyin [1 ]
Liu, Xu [1 ]
机构
[1] N Carolina State Univ, Raleigh, NC 27695 USA
关键词
Profiling; memory inefficiencies; performance; Android; LOCALITY;
D O I
10.1145/3570361.3592503
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Optimizing performance inefficiencies in memory hierarchies is well-known for native languages, such as C and C++. There are few studies, however, on exploring memory inefficiencies in Android Runtime (ART). Running in ART, managed languages, such as Java and Kotlin, employ various abstractions, such as runtime support, ahead-of-time (AOT) compilation, and garbage collection (GC), which hide important execution details from the plain source code. In this paper, we develop DroidPerf, a lightweight, object-centric memory profiler for ART, which associates memory inefficiencies with objects created and used in Android apps. With such object-level information, DroidPerf is able to guide locality optimization on memory layouts, access patterns, and allocation patterns. Guided by DroidPerf, we optimize a number of popular Android apps and obtain significant performance gains. Many inefficiencies are confirmed by the code authors and optimization patches are under evaluation for upstreaming. As a practical tool, DroidPerf incurs similar to 32% runtime overhead and similar to 14% memory overhead on average. Furthermore, DroidPerf works in the production environment with off-the-shelf hardware, OS, Dalvik virtual machine, ART, and unmodified Android app source code.
引用
收藏
页码:75 / 89
页数:15
相关论文
共 50 条
  • [1] A Light Weight Energy Profiling Approach on Android Devices
    Yang, Peixing
    Zhou, Di
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING 2015 (ICMMCCE 2015), 2015, 39 : 1017 - 1022
  • [2] META: Memory Exploration Tool for Android Devices
    Parikh, Nisarg
    Gohil, Varun
    Awasthi, Manu
    MOBICOM'18: PROCEEDINGS OF THE 24TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, 2018, : 774 - 776
  • [3] Collection, preservation and contextualization of digital objects for Android mobile devices
    Soares, Raquel
    Pereira, Marco
    Martins, Joaquim Arnaldo
    RISTI - Revista Iberica de Sistemas e Tecnologias de Informacao, 2012, (09): : 75 - 89
  • [4] Acquisition and analysis of volatile memory from android devices
    Sylve, Joe
    Case, Andrew
    Marziale, Lodovico
    Richard, Golden G.
    DIGITAL INVESTIGATION, 2012, 8 (3-4) : 175 - 184
  • [5] A TOOL FOR VOLATILE MEMORY ACQUISITION FROM ANDROID DEVICES
    Yang, Haiyu
    Zhuge, Jianwei
    Liu, Huiming
    Liu, Wei
    ADVANCES IN DIGITAL FORENSICS XII, 2016, 484 : 365 - 378
  • [6] A code protection scheme by process memory relocation for android devices
    Xiaosong Zhang
    Yu-an Tan
    Changyou Zhang
    Yuan Xue
    Yuanzhang Li
    Jun Zheng
    Multimedia Tools and Applications, 2018, 77 : 11137 - 11157
  • [7] A code protection scheme by process memory relocation for android devices
    Zhang, Xiaosong
    Tan, Yu-an
    Zhang, Changyou
    Xue, Yuan
    Li, Yuanzhang
    Zheng, Jun
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (09) : 11137 - 11157
  • [8] A Website Fingerprinting Attack based on the Virtual Memory of the Process on Android Devices
    Okazaki, Tatsuya
    Kato, Hiroya
    Haruta, Shuichiro
    Sasase, Iwao
    2021 26TH IEEE ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS {APCC), 2021, : 7 - 12
  • [9] An Anti-forensics Method against Memory Acquiring for Android Devices
    Zheng, Jiamin
    Tan, Yu-An
    Zhang, Xiaosong
    Liang, Chen
    Zhang, Changyou
    Zheng, Jun
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 214 - 218
  • [10] Forensic Analysis of Android Runtime (ART) Application Heap Objects in Emulated and Real Devices
    Muniz Soares, Alberto Magno
    de Sousa Junior, Rafael Timoteo
    INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, 867 : 130 - 147