core dump

(redirected from Memory dump)
Also found in: Thesaurus, Encyclopedia.

core dump

n.
A copy of the data stored in the core memory of a computer, usually used for debugging purposes.
ThesaurusAntonymsRelated WordsSynonymsLegend:
Noun1.core dump - (computer science) dump of the contents of the chief registers in the CPU; usually used for debugging
computer science, computing - the branch of engineering science that studies (with the aid of computers) computable processes and structures
dump - (computer science) a copy of the contents of a computer storage device; sometimes used in debugging programs
Translations
Mentioned in ?
References in periodicals archive ?
When a virtual machine is running it is possible through the use of existing tools (e.g., memory dump to file) to gather information about memory's (e.g., process list, interrupt description table, kernel mode, user mode, etc.) from both inside and outside of the virtual machine OS.
The only Microsoft-endorsed solution, which was posted to the support forum Wednesday by a user, is worthless to netbook owners whose systems lack a CD or DVD drive.<p>Late Thursday, however, someone identified as "John E" and labeled as a Microsoft employee asked users with the blue screen problem to submit a memory dump file from their PCs for examination.<p>The impact now stretches beyond Microsoft.
(http://ntsecurity.nu/toolbox/pmdump/) or by crashing the system to obtain a physical memory dump.
If the attacker does not find what it is looking for, it will start over and over again with a fresh memory dump of the very first time the agent entered the spoof environment.
A memory dump is a copy or a snapshot of the contents of a system's memory at the point of a system crash.
Schuster [26] explored the structure of memory containing processes' data and then proposed a search pattern to scan the whole memory dump for traces of physical memory objects independent of kernel's list of memory objects.
To the best of the authors knowledge, [7] was the only major work that has attempted to recover graphic images from a GPUs global memory dump using CUDA.
A memory dump of the malware process revealed a network request to http[:]//icanhazip[.]com, which allows the malware to identify the public IP address of the infected machine, and the occurrence of "GetAsyncKeyState," a Windows API used frequently by keyloggers to identify keyboard keys pressed by the user.