DID YOU KNOW? DTIC has over 3.5 million final reports on DoD funded research, development, test, and evaluation activities available to our registered users. Click
HERE to register or log in.
Accession Number:
AD1085068
Title:
Security and Performance Analysis of Custom Memory Allocators
Descriptive Note:
[Technical Report, Research Report]
Corporate Author:
MIT Lincoln Laboratory
Report Date:
2019-10-03
Pagination or Media Count:
76
Abstract:
By definition, memory corruption occurs when memory is modified illegally. The memory contract between the program and operating system is violated, and as a result, malicious actions may occur. We use the term may because an instance of memory corruption does not necessarily lead to a security exploit.
Distribution Statement:
[A, Approved For Public Release]