Back to Results
First PageMeta Content
Java platform / Computing platforms / Memory management / Pointer / Java virtual machine / Java Native Interface / Dynamic random-access memory / Type safety / ECC memory / Computing / Computer memory / Cross-platform software


Using Memory Errors to Attack a Virtual Machine Sudhakar Govindavajhala ∗ Andrew W. Appel Princeton University {sudhakar,appel}@cs.princeton.edu Abstract
Add to Reading List

Document Date: 2003-03-06 09:41:50


Open Document

File Size: 544,71 KB

Share Result on Facebook

City

New York / /

Company

IBM / ACM Press / Enhanced Memory Systems Inc. / Boeing Radiation Effects Laboratory / AMD / Microsoft / John Wiley & Sons / Actel / /

Currency

pence / /

/

Event

Force Majeure / /

Facility

Imperial College / Andrew W. Appel Princeton University / /

IndustryTerm

tamper resistant devices / memory error detection hardware / security processors / disk-resident software / high-energy photons / system software / oil-drilling / processor chip / energy / memory technologies / tamper-resistant processor / high-energy subatomic particles / cryptographic protocols / high-energy electrons / oil exploration / plastic and metal packaging material / Software-injected anywhere-in-physical-memory faults / software logging / technology changes / Software-injected in-process faults / high energy / e - commerce / memory chips / untrusted software / few high-end x86compatible processors / random hardware / /

OperatingSystem

Linux / /

Organization

Imperial College London / Princeton University / /

Person

Eugene Normand / Karthik Prasanna / David Fisch / Brent Waters / Crispin Cowan / Peter Creath / Gang Tan / Michael Schuette / Ed Felten / Tom van Vleck / Jim Roberts / Formal Syntax / Perry Cook / Andrew W. Appel / /

Position

editor / Java garbage collector / security manager / dentist / /

Product

Java(TM) 2 Runtime Environment / Java 2 Runtime Environment / /

ProgrammingLanguage

Java / Java bytecode / C / K / C++ / /

ProvinceOrState

New York / /

PublishedMedium

Lecture Notes in Computer Science / /

Technology

semiconductor / alpha / Virtual Machine / radiation / memory technologies / RAM / X-ray / Linux / tamper-resistant processor / cache memory / P4 processor / smart card / Security Protocols / processor chip / SRAM / operating system / operating systems / memory chips / 8 memory chips / Java / DRAM technology / security processors / virtual memory / DRAM chips / x86compatible processors / just-in-time compiler / /

URL

http /

SocialTag