Memory protection

Results: 165



#Item
61Embedded operating systems / Cross-platform software / Procedural programming languages / OpenBSD / Software bugs / Address space layout randomization / Buffer overflow protection / C dynamic memory allocation / Pascal / Computing / Software / Computer programming

Converting OpenBSD to PIE Pascal Stumpf <> AsiaBSDCon 2015, March 15, Tokyo Pascal Stumpf: Converting OpenBSD to PIE

Add to Reading List

Source URL: www.obsd.si

Language: English - Date: 2015-03-15 03:31:17
62EEPROM / Computing / IBM PC compatibles / Computer buses / Computer memory / I²C / Computer hardware

ST24C16, ST25C16 ST24W16, ST25W16 16 Kbit Serial I2C Bus EEPROM with User-Defined Block Write Protection 1 MILLION ERASE/WRITE CYCLES, with 40 YEARS DATA RETENTION

Add to Reading List

Source URL: hextechsecurity.com

Language: English - Date: 2015-03-01 11:09:58
63Internet / Internet standards / HTTP / MIME / Cryptographic protocols / Internet media type / DomainKeys Identified Mail / Cypherpunk anonymous remailer / Computing / Email / OSI protocols

Memory Hole: Cryptographic protection for e-mail headers Daniel Kahn Gillmor <> IETF 92 Dallas, March 2015

Add to Reading List

Source URL: www.ietf.org

Language: English - Date: 2015-03-22 21:24:43
64Embedded operating systems / Cross-platform software / Procedural programming languages / OpenBSD / Software bugs / Address space layout randomization / Buffer overflow protection / C dynamic memory allocation / Pascal / Computing / Software / Computer programming

Converting OpenBSD to PIE Pascal Stumpf <> AsiaBSDCon 2015, March 15, Tokyo Pascal Stumpf: Converting OpenBSD to PIE

Add to Reading List

Source URL: www.openbsd.org.my

Language: English - Date: 2015-03-15 03:31:17
65System software / FreeRTOS / Nios II / Computer architecture / Embedded operating systems / Real-time operating systems

Product Announcement FreeRTOS V6.0.0 includes integrated memory protection (MPU) support for Cortex-M3 MCUs October 2009

Add to Reading List

Source URL: www.freertos.org

Language: English - Date: 2009-10-16 10:53:29
66Software bugs / Subroutines / Memory management / Call stack / Buffer overflow protection / Pointer / Stack buffer overflow / Stack / C dynamic memory allocation / Computing / Software engineering / Computer programming

Automated Security Debugging Using Program Structural Constraints∗ Chongkyung Kil∗, Emre Can Sezer∗, Peng Ning∗, and Xiaolan Zhang† Department of Computer Science∗ North Carolina State University {ckil, eseze

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:25:58
67Memory management / Computer errors / Software bugs / Computer memory / Buffer overflow protection / Segmentation fault / Buffer overflow / Call stack / GNU Debugger / Computing / Computer programming / Software engineering

Guarded Memory Move (GMM) White Paper VERSION 0.5 Guarded Memory Move (GMM) Buffer Overflow Detection And Analysis Davide Libenzi

Add to Reading List

Source URL: xmailserver.org

Language: English - Date: 2007-02-16 03:03:26
68ESET / Computer security / System software / Two-factor authentication / Antivirus software / ESET NOD32 / Software

Endpoint Protection ESET Endpoint Security for Android protects your company’s mobile fleet with ESET NOD32® proactive technology. It scans all applications, files and memory

Add to Reading List

Source URL: static4.esetstatic.com

Language: English - Date: 2014-10-30 10:23:20
69ESET / Computer security / System software / Two-factor authentication / Antivirus software / ESET NOD32 / Software

Endpoint Protection ESET Endpoint Security for Android protects your company’s mobile fleet with ESET NOD32® proactive technology. It scans all applications, files and memory

Add to Reading List

Source URL: static1.esetstatic.com

Language: English - Date: 2014-10-30 10:23:20
70Computer memory / Virtual memory / Central processing unit / Instruction set architectures / Memory management / Pointer / Memory management unit / MIPS architecture / Memory protection / Computer architecture / Computing / Computer hardware

The CHERI capability model: Revisiting RISC in an age of risk Jonathan Woodruff† Robert N. M. Watson† David Chisnall† Simon W. Moore† Jonathan Anderson† Brooks Davis‡ Ben Laurie§ Peter G. Neumann‡ Robert N

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-04-24 18:23:36
UPDATE