Map
Index
Random
Help
th

Quote: use region-based memory allocation for secure systems; smaller trusted computing base, avoids garbage collection pauses, region profiling, safe memory operations without leaks

topics > all references > references t-z > QuoteRef: walkD7_2000 , p. 702



Topic:
operating system security
Group:
memory management
Topic:
memory management by regions or memory pool

Quotation Skeleton

If [region-based memory allocation] are used in a secure system … be possible to formally verify that the region … . [p. 703] because region operations are constant-time and … are associated with conventional garbage collectors … . By using a region profiler [ref], programmers can quickly identify the memory regions that are causing … Most importantly, throughout the programming process, a type … it prevents dereferencing [pointers to deallocated objects] … It also ensures that every memory region that …   Google-1   Google-2

Copyright clearance needed for quotation.


Related Topics up

Topic: operating system security (17 items)
Group: memory management   (11 topics, 346 quotes)
Topic: memory management by regions or memory pool (17 items)

Copyright © 2002-2008 by C. Bradford Barber. All rights reserved.
Thesa is a trademark of C. Bradford Barber.