Memory protection

Results: 165



#Item
11Using Cortex-M3 and Cortex-M4 Fault Exception Application Note 209 Abstract The Cortex-M processors implement an efficient exception model that also traps illegal memory accesses and several incorrect program conditions.

Using Cortex-M3 and Cortex-M4 Fault Exception Application Note 209 Abstract The Cortex-M processors implement an efficient exception model that also traps illegal memory accesses and several incorrect program conditions.

Add to Reading List

Source URL: www.keil.com

Language: English - Date: 2016-03-11 03:37:29
12PROCEEDINGS OF THE IEEE, VOL. 63, NO. 9, SEPTEMBER] [Sa]

PROCEEDINGS OF THE IEEE, VOL. 63, NO. 9, SEPTEMBER] [Sa]

Add to Reading List

Source URL: ix.cs.uoregon.edu

Language: English - Date: 2010-10-08 02:30:09
13

PDF Document

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:58
14Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture

Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2015-12-01 06:21:41
15CFIMon: Detecting Violation of Control Flow Integrity using Performance Counters Yubin Xia† ‡, Yutao Liu† ‡, Haibo Chen†, Binyu Zang‡ †Institute of Parallel and Distributed Systems, Shanghai Jiao Tong Unive

CFIMon: Detecting Violation of Control Flow Integrity using Performance Counters Yubin Xia† ‡, Yutao Liu† ‡, Haibo Chen†, Binyu Zang‡ †Institute of Parallel and Distributed Systems, Shanghai Jiao Tong Unive

Add to Reading List

Source URL: ipads.se.sjtu.edu.cn

Language: English - Date: 2012-08-23 22:16:01
16Code-Pointer Integrity Volodymyr Kuznetsov∗ , L´aszl´o Szekeres‡ , Mathias Payer†,§ George Candea∗ , R. Sekar‡ , Dawn Song† ∗ Ecole ´ † UC

Code-Pointer Integrity Volodymyr Kuznetsov∗ , L´aszl´o Szekeres‡ , Mathias Payer†,§ George Candea∗ , R. Sekar‡ , Dawn Song† ∗ Ecole ´ † UC

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
17CODOMs: Protecting Software with Code-centric Memory Domains Lluís Vilanova∗†§ Muli Ben-Yehuda§  Nacho Navarro∗

CODOMs: Protecting Software with Code-centric Memory Domains Lluís Vilanova∗†§ Muli Ben-Yehuda§ Nacho Navarro∗

Add to Reading List

Source URL: www.mulix.org

Language: English - Date: 2016-06-16 09:04:37
18Thwarting Memory Disclosure with Efficient Hypervisor-enforced Intra-domain Isolation Yutao Liu, Tianyu Zhou, Kexin Chen, Haibo Chen, Yubin Xia Shanghai Key Laboratory of Scalable Computing and Systems & Institute of Par

Thwarting Memory Disclosure with Efficient Hypervisor-enforced Intra-domain Isolation Yutao Liu, Tianyu Zhou, Kexin Chen, Haibo Chen, Yubin Xia Shanghai Key Laboratory of Scalable Computing and Systems & Institute of Par

Add to Reading List

Source URL: ipads.se.sjtu.edu.cn

Language: English - Date: 2015-08-16 21:09:13
19Portable Software Fault Isolation Joshua A. Kroll Computer Science Department Princeton University Princeton, NJ

Portable Software Fault Isolation Joshua A. Kroll Computer Science Department Princeton University Princeton, NJ

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2014-05-10 07:53:45
20U.S. Department of Justice Office of Justice Programs Office of Juvenile Justice and Delinquency Prevention Robert L. Listenbee, Administrator

U.S. Department of Justice Office of Justice Programs Office of Juvenile Justice and Delinquency Prevention Robert L. Listenbee, Administrator

Add to Reading List

Source URL: www.ojjdp.gov

Language: English - Date: 2015-09-16 12:43:36