Memory corruption detection system and method using...

Electrical computers and digital processing systems: memory – Storage accessing and control – Control technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C711S170000, C711S210000, C714S005110, C714S042000, C714S054000

Reexamination Certificate

active

07930491

ABSTRACT:
Systems, methods, apparatus and software can be implemented to detect possible instances of memory corruption. By analyzing memory blocks stored in a memory, provided in a snapshot file, or provided in a core dump, implicit and/or explicit contingency chains can be obtained. Analysis of these contingency chains identifies potential memory corruption sites, and subsequent verification provides greater confidence in the identification.

REFERENCES:
patent: 5559980 (1996-09-01), Connors et al.
patent: 5590329 (1996-12-01), Goodnow, II et al.
patent: 5689707 (1997-11-01), Donnelly
patent: 5842019 (1998-11-01), Kolawa et al.
patent: 5911073 (1999-06-01), Mattson, Jr. et al.
patent: 5953530 (1999-09-01), Rishi et al.
patent: 6085029 (2000-07-01), Kolawa et al.
patent: 6126329 (2000-10-01), Bennett et al.
patent: 6154128 (2000-11-01), Wookey et al.
patent: 6182249 (2001-01-01), Wookey et al.
patent: 6237114 (2001-05-01), Wookey et al.
patent: 6523141 (2003-02-01), Cantrill
patent: 6560773 (2003-05-01), Alexander, III et al.
patent: 6618824 (2003-09-01), Hastings
patent: 6634020 (2003-10-01), Bates et al.
patent: 6654903 (2003-11-01), Sullivan et al.
patent: 6658652 (2003-12-01), Alexander, III et al.
patent: 6718485 (2004-04-01), Reiser
patent: 6799200 (2004-09-01), Blackmore et al.
patent: 7181476 (2007-02-01), Lee et al.
patent: 2004/0059878 (2004-03-01), Madany
patent: 2004/0172513 (2004-09-01), Nelson
patent: 2004/0221120 (2004-11-01), Abrashkevich et al.
patent: 2005/0289307 (2005-12-01), Achanta et al.
The Oxford Handbook of Memory,Chapter 4, Contingency Analyses of Memory, Author: Michael J. Kahana, Oxford University Press, 2000, pp. 59-72.
Cal Erickson, “Memory Leak Detection In Embedded Systems,” Linux Journal, Sep. 1, 2002; 5 pages; http://www.linuxjournal.com.
Cal Erickson, “Memory Leak Detection in C++,” Linux Journal, Jun. 1, 2003, 5 pages, http://www.linuxjournal.com.
Jun Xu, Xiangrong Wang, Christopher Pham, “Less Intrusive Memory Leak Detection Inside Kernel,” (Fast Abstract ISSRE 2003); 14thIEEE International Symposium on Software Reliability Engineering (ISSRE 2003); Denver, Colorado; Nov. 17-20, 2003; Chillarege Press; Copyright 2003 (2 pages).
Xiangrong Wang, Jun Xu, Christopher H. Pham, “An Effective Method to Detect Software Memory Leakage Leveraged from Neuroscience Principles Governing Human Memory Behavior,” 15thInternational Symposium on Software Reliability Engineering (ISSRE 2004), Saint Malo, Bretagne, France, Nov. 2-5, 2004 (11 pages).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Memory corruption detection system and method using... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Memory corruption detection system and method using..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Memory corruption detection system and method using... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2698971

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.