TECHNOLOGIES FOR ROOT CAUSE IDENTIFICATION OF USE-AFTER-FREE MEMORY CORRUPTION BUGS
First Claim
1. A computing device for identification of a potential root cause of a use-after-free memory corruption bug of a program, the computing device comprising:
- a replay module to replay execution of the program based on an execution log of the program, wherein the execution log comprises an ordered set of executed instructions of the program that resulted in the use-after-free memory corruption bug;
a corruption candidate identification module to (i) compare a use-after-free memory address access of the program to a memory address associated with an occurrence of the use-after-free memory corruption bug in response to detection of the use-after-free memory address access and (ii) record, to a candidate list, the use-after-free memory address access of the program as a candidate for a root cause of the use-after-free memory corruption bug in response to detection of a match between the use-after-free memory address access of the program and the memory address associated with the occurrence of the use-after-free memory corruption bug.
1 Assignment
0 Petitions
Accused Products
Abstract
Technologies for identification of a potential root cause of a use-after-free memory corruption bug of a program include a computing device to replay execution of the execution of the program based on an execution log of the program. The execution log comprises an ordered set of executed instructions of the program that resulted in the use-after-free memory corruption bug. The computing device compares a use-after-free memory address access of the program to a memory address associated with an occurrence of the use-after-free memory corruption bug in response to detecting the use-after-free memory address access and records the use-after-free memory address access of the program as a candidate for a root cause of the use-after-free memory corruption bug to a candidate list in response to detecting a match between the use-after-free memory address access of the program and the memory address associated with the occurrence of the use-after-free memory corruption bug.
-
Citations
25 Claims
-
1. A computing device for identification of a potential root cause of a use-after-free memory corruption bug of a program, the computing device comprising:
-
a replay module to replay execution of the program based on an execution log of the program, wherein the execution log comprises an ordered set of executed instructions of the program that resulted in the use-after-free memory corruption bug; a corruption candidate identification module to (i) compare a use-after-free memory address access of the program to a memory address associated with an occurrence of the use-after-free memory corruption bug in response to detection of the use-after-free memory address access and (ii) record, to a candidate list, the use-after-free memory address access of the program as a candidate for a root cause of the use-after-free memory corruption bug in response to detection of a match between the use-after-free memory address access of the program and the memory address associated with the occurrence of the use-after-free memory corruption bug. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. One or more machine-readable storage media comprising a plurality of instructions stored thereon that, in response to execution by a computing device, cause the computing device to:
-
replay execution of the program based on an execution log of the program, wherein the execution log comprises an ordered set of executed instructions of the program that result in the use-after-free memory corruption bug; compare a use-after-free memory address access of the program to a memory address associated with an occurrence of the use-after-free memory corruption bug in response to detecting the use-after-free memory address access; and record, to a candidate list, the use-after-free memory address access of the program as a candidate for the root cause of the use-after-free memory corruption bug in response to detecting a match between the use-after-free memory address access of the program and the memory address associated with the occurrence of the use-after-free memory corruption bug. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A method for identifying a potential root cause of a use-after-free memory corruption bug of a program, the method comprising:
-
replaying, by a computing device, execution of the program based on an execution log of the program, wherein the execution log comprises an ordered set of executed instructions of the program that result in the use-after-free memory corruption bug; comparing, by the computing device, a use-after-free memory address access of the program to a memory address associated with an occurrence of the use-after-free memory corruption bug in response to detecting the use-after-free memory address access; recording, by the computing device and to a candidate list, the use-after-free memory address access of the program as a candidate for the root cause of the use-after-free memory corruption bug in response to detecting a match between the use-after-free memory address access of the program and the memory address associated with the occurrence of the use-after-free memory corruption bug. - View Dependent Claims (19, 20, 21)
-
-
22. A computing device for recording execution of a program, the computing device comprising:
-
a memory recording module to record execution of the program to an execution log; and a memory corruption detection module to (i) monitor the execution of the program for an occurrence of a use-after-free memory corruption bug and (ii) record a memory address associated with the occurrence of the use-after-free memory corruption bug to a memory log. - View Dependent Claims (23, 24, 25)
-
Specification