Memory protection

Results: 165



#Item
1

CUP: Comprehensive User-Space Protection Nathan Burow, Derrick McKee, Scott A. Carr, Mathias Payer Memory Safety ●

Add to Reading List

Source URL: nebelwelt.net

Language: English - Date: 2018-08-13 04:41:49
    2

    Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks Dan Boneh1 , Henry Corrigan-Gibbs1 , and Stuart Schechter2 1 2

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2017-05-12 13:08:27
      3

      Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory Daniel Gruss∗, Julian Lettner†, Felix Schuster, Olga Ohrimenko, Istvan Haller, Manuel Costa Microsoft Research Abstract Cache-bas

      Add to Reading List

      Source URL: gruss.cc

      - Date: 2017-08-03 10:03:39
        4Foreign relations / Law / Government / Conservation and restoration / Traditions / Museology / Cultural heritage / Collections care / UNESCO / Convention for the Safeguarding of the Intangible Cultural Heritage / Convention on the Protection and Promotion of the Diversity of Cultural Expressions / Memory of the World Programme

        UNESCO. General Conference; 38th; Draft Recommendation concerning the Preservation of, and Access to, Documentary Heritage including in Digital Form; 2015

        Add to Reading List

        Source URL: unesdoc.unesco.org

        Language: English - Date: 2015-09-27 01:51:55
        5Computer security / Computer access control / Software / Computing / Access control / Memory management / Memory protection / Kernel / Capability-based security / Operating system / Access Control Matrix / File system

        Protection1 Butler W. Lampson Xerox Corporation Palo Alto, California Abstract

        Add to Reading List

        Source URL: research.microsoft.com

        Language: English - Date: 1997-12-31 17:54:34
        6Geography of Scotland / Scotland / Copinsay / Orkney / Papa Westray / Royal Society for the Protection of Birds / Waulkmill Bay

        Scottish registered charity NoOFC Spring and Summer Newsletter 2010 After the worst Orkney winter in many folks’ memory, how has our wildlife fared? perhaps for some, better than we had feared. Amazingly some

        Add to Reading List

        Source URL: s3.spanglefish.com

        Language: English - Date: 2014-11-25 04:15:39
        7Computer memory / Arrays / Circular buffer / Computing / Software bugs / Software engineering

        Buffer Program Update July 18, 2016 With the Department of Natural Resources’ (DNR) roll-out of the field-ready buffer protection maps on July 12, there will be a shift to program implementation by local government par

        Add to Reading List

        Source URL: bwsr.state.mn.us

        Language: English - Date: 2016-07-18 15:24:16
        8Software engineering / Computing / Computer programming / Data types / Primitive types / Software bugs / Assembly languages / Computer performance / Pointer / X86 assembly language / Subroutine / Buffer overflow protection

        Preventing memory error exploits with WIT Periklis Akritidis ∗ Cristian Cadar∗ Costin Raiciu∗ Manuel Costa

        Add to Reading List

        Source URL: www.doc.ic.ac.uk

        Language: English - Date: 2016-03-08 07:04:45
        9Computing / Software / System software / Hardware virtualization / Hypervisor / X86 virtualization / Hyper-V / Xen / Protection ring / VMware / Virtualization / Direct memory access

        Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework* Amit Vasudevan∗, Sagar Chaki† , Limin Jia∗ , Jonathan McCune‡ , James Newsome§ and Anupam Datta∗ ∗ CyLab, Carnegie M

        Add to Reading List

        Source URL: www.netsec.ethz.ch

        Language: English - Date: 2015-06-01 09:06:14
        10Computing / Computer architecture / Computer hardware / Computer memory / Central processing unit / Memory management / Virtual memory / Memory address / Memory protection / 64-bit computing / X86 / Random-access memory

        Intel SGX Explained Victor Costan and Srinivas Devadas , Computer Science and Artificial Intelligence Laboratory Massachusetts Institute of Technology

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2016-08-12 18:27:31
        UPDATE