Protection ring

Results: 137



#Item
21Advanced	
  x86:	
    BIOS	
  and	
  System	
  Management	
  Mode	
  Internals	
   System	
  Management	
  Mode	
  (SMM)	
   Xeno	
  Kovah	
  &&	
  Corey	
  Kallenberg	
   LegbaCore,	
  LLC	
  

Advanced  x86:   BIOS  and  System  Management  Mode  Internals   System  Management  Mode  (SMM)   Xeno  Kovah  &&  Corey  Kallenberg   LegbaCore,  LLC  

Add to Reading List

Source URL: opensecuritytraining.info

Language: English - Date: 2015-10-14 22:08:35
22Thwarting Memory Disclosure with Efficient Hypervisor-enforced Intra-domain Isolation Yutao Liu, Tianyu Zhou, Kexin Chen, Haibo Chen, Yubin Xia Shanghai Key Laboratory of Scalable Computing and Systems & Institute of Par

Thwarting Memory Disclosure with Efficient Hypervisor-enforced Intra-domain Isolation Yutao Liu, Tianyu Zhou, Kexin Chen, Haibo Chen, Yubin Xia Shanghai Key Laboratory of Scalable Computing and Systems & Institute of Par

Add to Reading List

Source URL: ipads.se.sjtu.edu.cn

Language: English - Date: 2015-08-16 21:09:13
23Offering Connectivity Solutions Through Innovative Products Product Application Notes Series A SCADA Implementation using IP based Network with Ring Topology for Path Protection

Offering Connectivity Solutions Through Innovative Products Product Application Notes Series A SCADA Implementation using IP based Network with Ring Topology for Path Protection

Add to Reading List

Source URL: www.cygnusmicro.com

Language: English - Date: 2015-09-22 06:20:39
    24Fine-Grained Control-Flow Integrity for Kernel Software Xinyang Ge∗ , Nirupama Talele∗ , Mathias Payer† , and Trent Jaeger∗ ∗ The  Pennsylvania State University

    Fine-Grained Control-Flow Integrity for Kernel Software Xinyang Ge∗ , Nirupama Talele∗ , Mathias Payer† , and Trent Jaeger∗ ∗ The Pennsylvania State University

    Add to Reading List

    Source URL: hexhive.github.io

    Language: English - Date: 2016-06-13 11:08:40
    25Rearchitecting System Software for the Cloud Muli Ben-Yehuda Technion   1

    Rearchitecting System Software for the Cloud Muli Ben-Yehuda Technion 1

    Add to Reading List

    Source URL: www.mulix.org

    Language: English - Date: 2016-06-16 09:04:37
    26Offering Connectivity Solutions Through Innovative Products Product Application Notes Series A SCADA Implementation using IP based Network with Ring Topology for Path Protection

    Offering Connectivity Solutions Through Innovative Products Product Application Notes Series A SCADA Implementation using IP based Network with Ring Topology for Path Protection

    Add to Reading List

    Source URL: www.cygnusmicro.com

    Language: English - Date: 2015-09-22 05:20:47
      27Reducing World Switches in Virtualized Environment with Flexible Cross-world Calls Wenhao Li, Yubin Xia, Haibo Chen, Binyu Zang, Haibing Guan Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong U

      Reducing World Switches in Virtualized Environment with Flexible Cross-world Calls Wenhao Li, Yubin Xia, Haibo Chen, Binyu Zang, Haibing Guan Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong U

      Add to Reading List

      Source URL: ipads.se.sjtu.edu.cn

      Language: English - Date: 2015-08-10 02:20:31
      28Hardware Virtualization Rootkits Dino A. Dai Zovi  Agenda •

      Hardware Virtualization Rootkits Dino A. Dai Zovi Agenda •

      Add to Reading List

      Source URL: www.trailofbits.com

      Language: English - Date: 2016-04-15 11:36:17
      29A DAM B ELAY 736 Escondido Road, Apt. 127 Stanford, CAEDUCATION

      A DAM B ELAY 736 Escondido Road, Apt. 127 Stanford, CAEDUCATION

      Add to Reading List

      Source URL: www.scs.stanford.edu

      Language: English - Date: 2016-01-02 20:09:14
      30Attacking Hypervisors via Firmware and Hardware Mikhail Gorobets, Oleksandr Bazhaniuk, Alex Matrosov, Andrew Furtak, Yuriy Bulygin  Advanced Threat Research

      Attacking Hypervisors via Firmware and Hardware Mikhail Gorobets, Oleksandr Bazhaniuk, Alex Matrosov, Andrew Furtak, Yuriy Bulygin Advanced Threat Research

      Add to Reading List

      Source URL: www.intelsecurity.com

      Language: English - Date: 2015-08-07 18:08:29