International Business Machines Corporation
Protecting against invalid memory references
Last updated:
Abstract:
Techniques facilitating hardware-based memory-error mitigation for heap-objects. In one example, a system can comprise a process that executes computer executable components stored in a non-transitory computer readable medium. The computer executable components comprise: an entry component; and a re-purpose component. The entry component can allocate an entry in a table to store bounds-information when an object is allocated in memory. The re-purpose component can re-purpose unused bits of an object address to store an index to the table entry.
Status:
Grant
Type:
Utility
Filling date:
15 Oct 2020
Issue date:
30 Aug 2022