Speaker
Description
Linux provides pseudo-files like /proc/self/maps for any process to examine its virtual memory map and how the memory regions are configured. memscan takes this to the next level by: 1) combining data from the Linux pseudo-files like pagemap, kpagecount, kpageflags and iomem; 2) performing common operations such as heap allocation, fork and sleep; 3) printing detailed memory page data at various levels of granularity down to the physical page with user-provided filters.
Memscan makes it easy to visualize memory utilization within a process, analyze it, compare it to different scenarios, and evaluate the behavior of the operating system's memory manager. Memscan was written as a teaching tool and experimental platform. Students, programmers and system administrators are able to make predictions about how the memory manager works and then perform experiments to test their predictions.
This paper explores the features of Memscan, examines various use cases and concludes with an analysis of its overall utility.
Author(s) Bio
Currently, Mark is a Visiting Professor at The University of Hawaii at Manoa’s College of Engineering. He teaches Software Reverse Engineering, C, C++, Object Oriented Programming, Data Structures, and Wireless Communications.
Mark is using Intel’s Software Guard Extensions (SGX) as a research platform for deploying software modules into secure enclaves.
Previously, Mark was a Systems Architect for HP Networking, providing leadership for networking products and supporting their wireless, security and unified communications portfolios.
Participation | In person |
---|---|
Level of Difficulty | Intermediate |
Pronouns | He/Him |
Do you require any special accommodations? | None |