METHOD OF DETERMINING MEMORY MISUSE Russian patent published in 2012 - IPC G06F12/16 

Abstract RU 2458386 C1

FIELD: information technology.

SUBSTANCE: following operations are performed: step 1 - computer system with the required program and monitoring apparatus is launched, carried out with possibility of collecting all memory accesses during execution of the program; step 2 - determining memory accessing through the monitoring apparatus. Program debugging information is used to extract a code line requesting access to a given memory address, and a set of variable which can be accessed during given memory accessing is also extracted; step 3 - after program execution, source code information, for each line of the source code, is used to extract a set of variables which can be accessed; step 4 - memory misuse is determined by comparing results of performing steps 2 and 3. Memory accessing is deemed misuse if the memory region corresponding to the given variable at the given program execution point was accessed, but in accordance with the source code, access to the given variable is not possible at the given moment of executing the program.

EFFECT: higher accuracy of determining memory misuse.

2 dwg

Similar patents RU2458386C1

Title Year Author Number
DYNAMIC INSTRUMENTATION TECHNIQUE 2008
  • Gerenkov Aleksej Anatol'Evich
  • Komkov Leonid Vladimirovich
RU2390821C1
METHOD FOR DEBUGGING MULTI-CORE MULTI-PROCESS COMPUTER SYSTEMS WITH REAL-TIME CONTROL MECHANISM 2024
  • Istomin Vladimir Georgievich
  • Eliseev Vladimir Sergeevich
  • Rodikov Aleksej Viktorovich
  • Gordienko Roman Grigorevich
  • Denisov Sergej Valerevich
  • Fedorenko Oleg Grigorevich
  • Rakovskij Pavel Sergeevich
  • Anosov Petr Mikhajlovich
RU2830957C1
ARTIFICIAL INTELLIGENCE BASED COMPUTER SECURITY SYSTEM 2017
  • Hasan, Syed Kamran
RU2750554C2
COMPUTING DEVICE, STORING LOOK UP TABLES TO COMPUTE A FUNCTION 2013
  • Gorissen Paulus Matkhias Khyubertus Mekhtildis Antonius
  • Tolkhejzen Lyudovikus Marinus Gerardus Mariya
RU2657178C2
METHOD FOR DETECTING ANOMALOUS EVENTS ON BASIS OF CONVOLUTION ARRAY OF SAFETY EVENTS 2017
  • Monastyrskij Aleksej Vladimirovich
  • Pavlyushchik Mikhail Aleksandrovich
  • Romanenko Aleksej Mikhajlovich
  • Golovkin Maksim Yurevich
RU2673711C1
COMPUTATION MEDIUM ADAPTER ACTIVATION/DEACTIVATION 2010
  • Dan Grejner
  • Charlz Gejni
  • Dejvid Kraddok
  • Antoni Koneski
  • Bet Glendening
  • Mark Farrel
  • Tomas Gregg
  • Ugochukvu N'Oku-Charlz
RU2562372C2
DEBUGGING NATIVE CODE BY TRANSITIONING FROM EXECUTION IN NATIVE MODE TO EXECUTION IN INTERPRETED MODE 2014
  • Koltachev, Mikhail
  • Khandelval, Nikkhil
  • Gandi, Akrosh
RU2668973C2
METHOD OF THE ANOMALOUS EVENTS DETECTING BY THE EVENT DIGEST POPULARITY 2017
  • Monastyrskij Aleksej Vladimirovich
  • Pavlyushchik Mikhail Aleksandrovich
  • Romanenko Aleksej Mikhajlovich
  • Golovkin Maksim Yurevich
RU2651196C1
INCREASING NUMBER OF GENERAL PURPOSE REGISTERS AVAILABLE TO INSTRUCTIONS 2010
  • Dan Grejner
  • Marsel' Mitran
  • Timoti Slidzhl
RU2562430C2
COHERENCE PROTOCOL AUGMENTATION TO INDICATE TRANSACTION STATUS 2015
  • Shvarts Erik Mark
  • Busaba Fadi Yusuf
  • Gshvind Mikhael Karl
  • Slegel Timoti
  • Salapura Valentina
  • Dzhakobi Kristian
  • Kejn Iii Kharold Uejd
RU2665306C2

RU 2 458 386 C1

Authors

Gorelkina Ekaterina Anatol'Evna

Jong Zhajkhun

Akhn Khunzhu

Dates

2012-08-10Published

2011-04-07Filed