首页>
外国专利>
After Disabling Memory Corruption Root Cause Identification Techniques
After Disabling Memory Corruption Root Cause Identification Techniques
展开▼
机译:禁用内存损坏后,根本原因识别技术
展开▼
页面导航
摘要
著录项
相似文献
摘要
Techniques for identifying the potential root cause of a memory corruption bug after releasing a program include computing devices that replay the execution of a program based on the execution log of the program. The execution log contains an ordered set of executed instructions of the program causing the bug to be used memory corruption after release. In response to detecting the use memory address access after the program is released, the computing device compares the used memory address access with the memory address associated with the occurrence of the used memory corruption bug after releasing the used memory address access, In response to detecting a match between the memory address associated with the occurrence of the memory corruption bug after being released, the use memory address access is released after the program is released. As a candidate for the root cause of the used memory corruption bug, .
展开▼