Map
Index
Random
Help
th

Quote: secure, region-based memory allocation has a smaller trusted computing base with constant-time operations, easily identified bottlenecks, safe memory operations, and deallocated regions

topics > all references > references t-z > QuoteRef: walkD7_2000 , p. 702



Topic:
memory management by regions or memory pool

Quotation Skeleton

If [region-based memory allocation] are used in a secure system … be possible to formally verify that the region … . [p. 703] because region operations are constant-time and … are associated with conventional garbage collectors … . By using a region profiler [ref], programmers can quickly identify the memory regions that are causing … Most importantly, throughout the programming process, a type … it prevents dereferencing [pointers to deallocated objects] … It also ensures that every memory region that …   Google-1   Google-2

Copyright clearance needed for quotation.


Related Topics up

Topic: memory management by regions or memory pool (17 items)

Copyright © 2002-2008 by C. Bradford Barber. All rights reserved.
Thesa is a trademark of C. Bradford Barber.