Memory protection

Results: 165



#Item
71Computer memory / Virtual memory / Central processing unit / Instruction set architectures / Memory management / Pointer / Memory management unit / MIPS architecture / Memory protection / Computer architecture / Computing / Computer hardware

The CHERI capability model: Revisiting RISC in an age of risk Jonathan Woodruff† Robert N. M. Watson† David Chisnall† Simon W. Moore† Jonathan Anderson† Brooks Davis‡ Ben Laurie§ Peter G. Neumann‡ Robert N

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-04-21 05:53:40
72X86 architecture / Central processing unit / Ring / Multics / Operating system / Segment descriptor / General protection fault / Protected mode / Computer architecture / Computing / Memory management

O PROTECTION IN AN INFORMATION PROCESSING UTILITY

Add to Reading List

Source URL: www.multicians.org

Language: English - Date: 2012-11-08 16:33:53
73Software bugs / Data types / Computer errors / Primitive types / Arrays / Buffer overflow protection / Buffer overflow / Stack buffer overflow / Memory safety / Computing / Software engineering / Computer programming

A Practical Dynamic Buffer Overflow Detector Olatunji Ruwase Monica S. Lam Transmeta Corporation

Add to Reading List

Source URL: suif.stanford.edu

Language: English - Date: 2003-11-22 16:45:00
74MIPS architecture / Ring / Instruction set / Capability-based security / 64-bit / Hypervisor / Kernel / Reduced instruction set computing / Memory protection / Computer architecture / Central processing unit / Instruction set architectures

Capability Hardware Enhanced RISC Instructions: CHERI Instruction-set architecture

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2015-01-15 09:17:36
75Virtual address space / Virtual memory / Computing / Software / Executable space protection / Address space layout randomization / PaX / System software

The Design and Implementation of Address Space Layout Randomization (ASLR) in the Windows Research Kernel (WRK) Student: MAK Chung Leung Supervisor: Prof. Lin GU Introduction

Add to Reading List

Source URL: www.cse.ust.hk

Language: English - Date: 2012-08-24 04:50:13
76Software / Rogue software / Computer network security / Computer virus / Spyware / Data loss / Norton AntiVirus / Real-time protection / Malware / System software / Antivirus software

Prevent Lost Data There’s no telling when your hard drive, flash drive, or memory card will go kaput. Save yourself the headache by preventing a disaster from happening to your equipment. Our backup and disaster preven

Add to Reading List

Source URL: www.pctactix.com

Language: English - Date: 2013-11-17 09:14:23
77International Commission on Radiological Protection

The concept of oversight, its connection to memory keeping and its relevance for the medium term – The findings of the RK&M initiative by Stephan Hotzel, RK&M and GRS, Germany

Add to Reading List

Source URL: www.oecd-nea.org

Language: English - Date: 2014-12-09 10:11:57
    78Embedded operating systems / Cross-platform software / Procedural programming languages / OpenBSD / Software bugs / Address space layout randomization / Buffer overflow protection / C dynamic memory allocation / Pascal / Computing / Software / Computer programming

    Converting OpenBSD to PIE Pascal Stumpf AsiaBSDCon 2015, March 15, Tokyo Pascal Stumpf: Converting OpenBSD to PIE

    Add to Reading List

    Source URL: www.openbsd.org

    Language: English - Date: 2015-03-15 03:31:17
    79Software bugs / Pointer / Kernel / Memory protection / C / 64-bit / Memory safety / Linux kernel / Computing / Software / Memory management

    The SAFE Machine An Architecture for Pervasive Information Flow Benjamin C. Pierce University of Pennsylvania

    Add to Reading List

    Source URL: www.cis.upenn.edu

    Language: English - Date: 2013-06-28 12:49:10
    80Memory management / Computer errors / Software bugs / Computer memory / Buffer overflow protection / Segmentation fault / Buffer overflow / Call stack / GNU Debugger / Computing / Computer programming / Software engineering

    Guarded Memory Move (GMM) White Paper VERSION 0.5 Guarded Memory Move (GMM) Buffer Overflow Detection And Analysis Davide Libenzi

    Add to Reading List

    Source URL: www.xmailserver.org

    Language: English - Date: 2007-02-16 03:03:26
    UPDATE