Protection ring

Results: 137



#Item
21Interrupts / System Management Mode / Interrupt flag / Interrupt / SMI / Advanced Configuration and Power Interface / Advanced Power Management / Protection ring / BIOS / Control register / INT

Advanced  x86:   BIOS  and  System  Management  Mode  Internals   System  Management  Mode  (SMM)   Xeno  Kovah  &&  Corey  Kallenberg   LegbaCore,  LLC  

Add to Reading List

Source URL: opensecuritytraining.info

Language: English - Date: 2015-10-14 22:08:35
22Cryptographic software / Hardware virtualization / Heartbleed / Internet security / Transport Layer Security / OpenSSL / Hypervisor / Hyper-V / Protection ring / Second Level Address Translation / Rootkit / Operating system

Thwarting Memory Disclosure with Efficient Hypervisor-enforced Intra-domain Isolation Yutao Liu, Tianyu Zhou, Kexin Chen, Haibo Chen, Yubin Xia Shanghai Key Laboratory of Scalable Computing and Systems & Institute of Par

Add to Reading List

Source URL: ipads.se.sjtu.edu.cn

Language: English - Date: 2015-08-16 21:09:13
23

Offering Connectivity Solutions Through Innovative Products Product Application Notes Series A SCADA Implementation using IP based Network with Ring Topology for Path Protection

Add to Reading List

Source URL: www.cygnusmicro.com

Language: English - Date: 2015-09-22 06:20:39
    24Computer architecture / Software / Computing / Operating system kernels / Linux kernel / Computer security / Control-flow integrity / Kernel / System call / Protection ring / MINIX 3 / Microkernel

    Fine-Grained Control-Flow Integrity for Kernel Software Xinyang Ge∗ , Nirupama Talele∗ , Mathias Payer† , and Trent Jaeger∗ ∗ The Pennsylvania State University

    Add to Reading List

    Source URL: hexhive.github.io

    Language: English - Date: 2016-06-13 11:08:40
    25Operating system kernels / Exokernel / Kernel / Virtualization / Protection ring / Virtual machine / Hypervisor / Cloud computing / Network virtualization / Operating system / Device driver / System virtual machine

    Rearchitecting System Software for the Cloud Muli Ben-Yehuda Technion 1

    Add to Reading List

    Source URL: www.mulix.org

    Language: English - Date: 2016-06-16 09:04:37
    26

    Offering Connectivity Solutions Through Innovative Products Product Application Notes Series A SCADA Implementation using IP based Network with Ring Topology for Path Protection

    Add to Reading List

    Source URL: www.cygnusmicro.com

    Language: English - Date: 2015-09-22 05:20:47
      27Hypervisor / VM / Hardware virtualization / Hyper-V / Protection ring / Mach / Xen / System call / Calling convention / Operating system / Embedded hypervisor

      Reducing World Switches in Virtualized Environment with Flexible Cross-world Calls Wenhao Li, Yubin Xia, Haibo Chen, Binyu Zang, Haibing Guan Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong U

      Add to Reading List

      Source URL: ipads.se.sjtu.edu.cn

      Language: English - Date: 2015-08-10 02:20:31
      28Software / System software / Computing / Hardware virtualization / Hypervisor / Virtual machine / VM / Virtualization / Protection ring / Operating system / Hardware-assisted virtualization / System virtual machine

      Hardware Virtualization Rootkits Dino A. Dai Zovi Agenda •

      Add to Reading List

      Source URL: www.trailofbits.com

      Language: English - Date: 2016-04-15 11:36:17
      29EMC Corporation / VMware / Christos Kozyrakis / Edouard Bugnion / USENIX / Xen / Linux kernel / Kernel / Operating system / User space / Protection ring / Latency

      A DAM B ELAY 736 Escondido Road, Apt. 127 Stanford, CAEDUCATION

      Add to Reading List

      Source URL: www.scs.stanford.edu

      Language: English - Date: 2016-01-02 20:09:14
      30Software / System software / Computing / Hypervisor / Hyper-V / Virtual machine / Virtualization / VM / Rootkit / Protection ring / Hardware virtualization / Embedded hypervisor

      Attacking Hypervisors via Firmware and Hardware Mikhail Gorobets, Oleksandr Bazhaniuk, Alex Matrosov, Andrew Furtak, Yuriy Bulygin Advanced Threat Research

      Add to Reading List

      Source URL: www.intelsecurity.com

      Language: English - Date: 2015-08-07 18:08:29
      UPDATE