Originally Posted by jaypas
How would I demonstrate that memory resources allocated to one user or process are protected from access by another user or process?
1) That (and your similar threads) sounds like homework. Don't ask us to do your homework.
2) It also sounds like the typical "prove a negative" problem. I know "demonstrate" is less than "prove", but how much less? You can't prove that there isn't a hole in Linux security. You could look for a hole and fail to find it, but that doesn't prove it isn't there.
No experiment should even be considered a demonstration of such protection. A detailed code review of the relevant parts of the Linux source code could be considered a demonstration of that protection. But I assume you are not looking for a project anywhere near that difficult.