International Business Machines Corporation
Protecting against invalid memory references

Last updated:

Abstract:

Techniques facilitating hardware-based memory-error mitigation for heap-objects. In one example, a system can comprise a process that executes computer executable components stored in a non-transitory computer readable medium. The computer executable components comprise: an entry component; and a re-purpose component. The entry component can allocate an entry in a table to store bounds-information when an object is allocated in memory. The re-purpose component can re-purpose unused bits of an object address to store an index to the table entry.

Status:
Grant
Type:

Utility

Filling date:

15 Oct 2020

Issue date:

30 Aug 2022