Feeds

Purdue researchers add ‘wakelock’ cleanup to phone power research

Fixing the ‘no-sleep’ bug

  • alert
  • submit to reddit

Boost IT visibility and business value

The Purdue University team which in March published a paper identifying how rogue apps and user-tracking can sap Android batteries has followed up with research into detecting and fixing the “wakelock” bugs.

The new study is to be presented at the MobiSys conference in the UK later this month. The researchers have extended their profiling to cover 187 apps, and found that 42 of them – more than 22 percent – had some kind of wakelock bug.

The problem is simple, says Purdue professor of electrical engineering Charlie Hu: programmers are human, and make mistakes. In juggling the various APIs they need to access to wake the phone up – for example, to receive an incoming call when the phone is asleep, or to check e-mail – they can leave the phone awake after the activity and drain the battery.

The Purdue group’s previous research identified bugs in newsreader apps, advertising tracking, and even the free version of Angry Birds (which devoted one-third of its unnecessary power consumption to GPS tracking). As noted at the time, I/O is a power hog and is often badly-handled by app developers.

Hu’s group uses a modified compiler to identify no-sleep bugs in software, and claims they can identify most, if not all, such bugs. ®

Gartner critical capabilities for enterprise endpoint backup

More from The Register

next story
Microsoft: We plan to CLEAN UP this here Windows Store town
Paid-for apps that provide free downloads? Really
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
Who needs hackers? 'Password1' opens a third of all biz doors
GPU-powered pen test yields more bad news about defences and passwords
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Hear ye, young cyber warriors of the realm: GCHQ wants you
Get involved, get a job and then never discuss work ever again
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
Microsoft cries UNINSTALL in the wake of Blue Screens of Death™
Cache crash causes contained choloric calamity
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
BYOD's dark side: Data protection
An endpoint data protection solution that adds value to the user and the organization so it can protect itself from data loss as well as leverage corporate data.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?