Memory protection

Results: 165



#Item
11Computer errors / Memory management / Central processing unit / Instruction set architectures / ARM architecture / Bus error / Control register / Page fault / Segmentation fault / Memory protection / ARM Cortex-M / Exception handling

Using Cortex-M3 and Cortex-M4 Fault Exception Application Note 209 Abstract The Cortex-M processors implement an efficient exception model that also traps illegal memory accesses and several incorrect program conditions.

Add to Reading List

Source URL: www.keil.com

Language: English - Date: 2016-03-11 03:37:29
12Crime prevention / Cryptography / Information governance / National security / Computer security / Information security / Memory protection / Capability-based security / Protection ring / Operating system / Principle of least privilege / Process management

PROCEEDINGS OF THE IEEE, VOL. 63, NO. 9, SEPTEMBER] [Sa]

Add to Reading List

Source URL: ix.cs.uoregon.edu

Language: English - Date: 2010-10-08 02:30:09
13Memory management / Instruction set architectures / Memory protection / Capability-based security / Kernel / Memory management unit / MIPS instruction set / Protection ring / Microkernel / EROS / Virtual memory / 64-bit computing

PDF Document

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:58
14Instruction set architectures / Central processing unit / Computer architecture / Memory management / Memory protection / Capability-based security / Pointer / MIPS instruction set / 64-bit computing / Instruction set / Reduced instruction set computing / Kernel

Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2015-12-01 06:21:41
15Central processing unit / Machine code / Software bugs / Return-oriented programming / Computer memory / Instruction set architectures / Buffer overflow protection / Self-modifying code / Subroutine / Stack / Return-to-libc attack / Instruction set

CFIMon: Detecting Violation of Control Flow Integrity using Performance Counters Yubin Xia† ‡, Yutao Liu† ‡, Haibo Chen†, Binyu Zang‡ †Institute of Parallel and Distributed Systems, Shanghai Jiao Tong Unive

Add to Reading List

Source URL: ipads.se.sjtu.edu.cn

Language: English - Date: 2012-08-23 22:16:01
16Software engineering / Computing / Computer programming / Software bugs / Data types / Memory management / Primitive types / Programming language implementation / Pointer / Memory safety / Dangling pointer / Buffer overflow protection

Code-Pointer Integrity Volodymyr Kuznetsov∗ , L´aszl´o Szekeres‡ , Mathias Payer†,§ George Candea∗ , R. Sekar‡ , Dawn Song† ∗ Ecole ´ † UC

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
17Computing / Software / Computer architecture / Memory management / Access control / Central processing unit / Virtual memory / Subroutines / Memory protection / Kernel / Capability-based addressing / Mandatory access control

CODOMs: Protecting Software with Code-centric Memory Domains Lluís Vilanova∗†§ Muli Ben-Yehuda§ Nacho Navarro∗

Add to Reading List

Source URL: www.mulix.org

Language: English - Date: 2016-06-16 09:04:37
18Cryptographic software / Hardware virtualization / Heartbleed / Internet security / Transport Layer Security / OpenSSL / Hypervisor / Hyper-V / Protection ring / Second Level Address Translation / Rootkit / Operating system

Thwarting Memory Disclosure with Efficient Hypervisor-enforced Intra-domain Isolation Yutao Liu, Tianyu Zhou, Kexin Chen, Haibo Chen, Yubin Xia Shanghai Key Laboratory of Scalable Computing and Systems & Institute of Par

Add to Reading List

Source URL: ipads.se.sjtu.edu.cn

Language: English - Date: 2015-08-16 21:09:13
19Software engineering / Computing / Computer programming / Memory management / Software bugs / Programming language implementation / Functional languages / C++ / Pointer / C dynamic memory allocation / Buffer overflow protection / Optimizing compiler

Portable Software Fault Isolation Joshua A. Kroll Computer Science Department Princeton University Princeton, NJ

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2014-05-10 07:53:45
20Childhood / Child abuse / Abuse / Family / Memory / Cognitive interview / Criminal investigation / Gundersen National Child Protection Training Center / Child sexual abuse / Suggestibility / Interview / Right to be heard

U.S. Department of Justice Office of Justice Programs Office of Juvenile Justice and Delinquency Prevention Robert L. Listenbee, Administrator

Add to Reading List

Source URL: www.ojjdp.gov

Language: English - Date: 2015-09-16 12:43:36
UPDATE