Electrical computers and digital processing systems: memory – Storage accessing and control – Control technique
Reexamination Certificate
2011-04-19
2011-04-19
Elmore, Stephen C (Department: 2185)
Electrical computers and digital processing systems: memory
Storage accessing and control
Control technique
C711S170000, C711S210000, C714S005110, C714S042000, C714S054000
Reexamination Certificate
active
07930491
ABSTRACT:
Systems, methods, apparatus and software can be implemented to detect possible instances of memory corruption. By analyzing memory blocks stored in a memory, provided in a snapshot file, or provided in a core dump, implicit and/or explicit contingency chains can be obtained. Analysis of these contingency chains identifies potential memory corruption sites, and subsequent verification provides greater confidence in the identification.
REFERENCES:
patent: 5559980 (1996-09-01), Connors et al.
patent: 5590329 (1996-12-01), Goodnow, II et al.
patent: 5689707 (1997-11-01), Donnelly
patent: 5842019 (1998-11-01), Kolawa et al.
patent: 5911073 (1999-06-01), Mattson, Jr. et al.
patent: 5953530 (1999-09-01), Rishi et al.
patent: 6085029 (2000-07-01), Kolawa et al.
patent: 6126329 (2000-10-01), Bennett et al.
patent: 6154128 (2000-11-01), Wookey et al.
patent: 6182249 (2001-01-01), Wookey et al.
patent: 6237114 (2001-05-01), Wookey et al.
patent: 6523141 (2003-02-01), Cantrill
patent: 6560773 (2003-05-01), Alexander, III et al.
patent: 6618824 (2003-09-01), Hastings
patent: 6634020 (2003-10-01), Bates et al.
patent: 6654903 (2003-11-01), Sullivan et al.
patent: 6658652 (2003-12-01), Alexander, III et al.
patent: 6718485 (2004-04-01), Reiser
patent: 6799200 (2004-09-01), Blackmore et al.
patent: 7181476 (2007-02-01), Lee et al.
patent: 2004/0059878 (2004-03-01), Madany
patent: 2004/0172513 (2004-09-01), Nelson
patent: 2004/0221120 (2004-11-01), Abrashkevich et al.
patent: 2005/0289307 (2005-12-01), Achanta et al.
The Oxford Handbook of Memory,Chapter 4, Contingency Analyses of Memory, Author: Michael J. Kahana, Oxford University Press, 2000, pp. 59-72.
Cal Erickson, “Memory Leak Detection In Embedded Systems,” Linux Journal, Sep. 1, 2002; 5 pages; http://www.linuxjournal.com.
Cal Erickson, “Memory Leak Detection in C++,” Linux Journal, Jun. 1, 2003, 5 pages, http://www.linuxjournal.com.
Jun Xu, Xiangrong Wang, Christopher Pham, “Less Intrusive Memory Leak Detection Inside Kernel,” (Fast Abstract ISSRE 2003); 14thIEEE International Symposium on Software Reliability Engineering (ISSRE 2003); Denver, Colorado; Nov. 17-20, 2003; Chillarege Press; Copyright 2003 (2 pages).
Xiangrong Wang, Jun Xu, Christopher H. Pham, “An Effective Method to Detect Software Memory Leakage Leveraged from Neuroscience Principles Governing Human Memory Behavior,” 15thInternational Symposium on Software Reliability Engineering (ISSRE 2004), Saint Malo, Bretagne, France, Nov. 2-5, 2004 (11 pages).
Li Chen
Wang Xiangrong
Xu Jun
Campbell Stephenson LLP
Cisco Technology Inc.
Elmore Stephen C
Savla Arpan P.
LandOfFree
Memory corruption detection system and method using... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Memory corruption detection system and method using..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Memory corruption detection system and method using... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2698971