<--- Back to Details
First PageDocument Content
Instruction set architectures / Central processing unit / Computer architecture / Memory management / Memory protection / Capability-based security / Pointer / MIPS instruction set / 64-bit computing / Instruction set / Reduced instruction set computing / Kernel
Date: 2015-12-01 06:21:41
Instruction set architectures
Central processing unit
Computer architecture
Memory management
Memory protection
Capability-based security
Pointer
MIPS instruction set
64-bit computing
Instruction set
Reduced instruction set computing
Kernel

Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture

Add to Reading List

Source URL: www.cl.cam.ac.uk

Download Document from Source Website

File Size: 853,14 KB

Share Document on Facebook

Similar Documents

CUP: Comprehensive User-Space Protection Nathan Burow, Derrick McKee, Scott A. Carr, Mathias Payer Memory Safety ●

DocID: 1uRie - View Document

Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks Dan Boneh1 , Henry Corrigan-Gibbs1 , and Stuart Schechter2 1 2

DocID: 1up3n - View Document

Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory Daniel Gruss∗, Julian Lettner†, Felix Schuster, Olga Ohrimenko, Istvan Haller, Manuel Costa Microsoft Research Abstract Cache-bas

DocID: 1tLuC - View Document

Foreign relations / Law / Government / Conservation and restoration / Traditions / Museology / Cultural heritage / Collections care / UNESCO / Convention for the Safeguarding of the Intangible Cultural Heritage / Convention on the Protection and Promotion of the Diversity of Cultural Expressions / Memory of the World Programme

UNESCO. General Conference; 38th; Draft Recommendation concerning the Preservation of, and Access to, Documentary Heritage including in Digital Form; 2015

DocID: 1roSU - View Document

Computer security / Computer access control / Software / Computing / Access control / Memory management / Memory protection / Kernel / Capability-based security / Operating system / Access Control Matrix / File system

Protection1 Butler W. Lampson Xerox Corporation Palo Alto, California Abstract

DocID: 1r6Eg - View Document