<--- Back to Details
First PageDocument Content
MIPS architecture / Ring / Instruction set / 64-bit / Hypervisor / Reduced instruction set computing / Capability-based security / Kernel / Memory protection / Computer architecture / Central processing unit / Instruction set architectures
Date: 2014-07-14 10:03:30
MIPS architecture
Ring
Instruction set
64-bit
Hypervisor
Reduced instruction set computing
Capability-based security
Kernel
Memory protection
Computer architecture
Central processing unit
Instruction set architectures

Capability Hardware Enhanced RISC Instructions: CHERI Instruction-set architecture

Add to Reading List

Source URL: www.cl.cam.ac.uk

Download Document from Source Website

File Size: 637,15 KB

Share Document on Facebook

Similar Documents

CUP: Comprehensive User-Space Protection Nathan Burow, Derrick McKee, Scott A. Carr, Mathias Payer Memory Safety ●

DocID: 1uRie - View Document

Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks Dan Boneh1 , Henry Corrigan-Gibbs1 , and Stuart Schechter2 1 2

DocID: 1up3n - View Document

Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory Daniel Gruss∗, Julian Lettner†, Felix Schuster, Olga Ohrimenko, Istvan Haller, Manuel Costa Microsoft Research Abstract Cache-bas

DocID: 1tLuC - View Document

Foreign relations / Law / Government / Conservation and restoration / Traditions / Museology / Cultural heritage / Collections care / UNESCO / Convention for the Safeguarding of the Intangible Cultural Heritage / Convention on the Protection and Promotion of the Diversity of Cultural Expressions / Memory of the World Programme

UNESCO. General Conference; 38th; Draft Recommendation concerning the Preservation of, and Access to, Documentary Heritage including in Digital Form; 2015

DocID: 1roSU - View Document

Computer security / Computer access control / Software / Computing / Access control / Memory management / Memory protection / Kernel / Capability-based security / Operating system / Access Control Matrix / File system

Protection1 Butler W. Lampson Xerox Corporation Palo Alto, California Abstract

DocID: 1r6Eg - View Document