<--- Back to Details
First PageDocument Content
Instruction set architectures / Software engineering / MIPS architecture / Pointer / Memory protection / 64-bit / Ring / Capability-based addressing / C / Computer architecture / Computing / Memory management
Date: 2014-07-08 10:34:26
Instruction set architectures
Software engineering
MIPS architecture
Pointer
Memory protection
64-bit
Ring
Capability-based addressing
C
Computer architecture
Computing
Memory management

CHERI: A RISC capability machine for practical memory safety

Add to Reading List

Source URL: www.cl.cam.ac.uk

Download Document from Source Website

File Size: 1,08 MB

Share Document on Facebook

Similar Documents

CUP: Comprehensive User-Space Protection Nathan Burow, Derrick McKee, Scott A. Carr, Mathias Payer Memory Safety ●

DocID: 1uRie - View Document

Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks Dan Boneh1 , Henry Corrigan-Gibbs1 , and Stuart Schechter2 1 2

DocID: 1up3n - View Document

Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory Daniel Gruss∗, Julian Lettner†, Felix Schuster, Olga Ohrimenko, Istvan Haller, Manuel Costa Microsoft Research Abstract Cache-bas

DocID: 1tLuC - View Document

Foreign relations / Law / Government / Conservation and restoration / Traditions / Museology / Cultural heritage / Collections care / UNESCO / Convention for the Safeguarding of the Intangible Cultural Heritage / Convention on the Protection and Promotion of the Diversity of Cultural Expressions / Memory of the World Programme

UNESCO. General Conference; 38th; Draft Recommendation concerning the Preservation of, and Access to, Documentary Heritage including in Digital Form; 2015

DocID: 1roSU - View Document

Computer security / Computer access control / Software / Computing / Access control / Memory management / Memory protection / Kernel / Capability-based security / Operating system / Access Control Matrix / File system

Protection1 Butler W. Lampson Xerox Corporation Palo Alto, California Abstract

DocID: 1r6Eg - View Document