Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,217,172 papers from all fields of science
Search
Sign In
Create Free Account
Memory protection
Known as:
Mprotect
, MPK
, Secure memory
Expand
Memory protection is a way to control memory access rights on a computer, and is a part of most modern processor architectures and operating systems…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
48 relations
Address space layout randomization
Atari
C dynamic memory allocation
Capability-based addressing
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
HCFI: Hardware-enforced Control-Flow Integrity
Nick Christoulakis
,
G. Christou
,
E. Athanasopoulos
,
S. Ioannidis
Conference on Data and Application Security and…
2016
Corpus ID: 605252
Control-flow hijacking is the principal method for code-reuse techniques like Return-oriented Programming (ROP) and Jump-oriented…
Expand
Highly Cited
2016
Highly Cited
2016
No-Execute-After-Read: Preventing Code Disclosure in Commodity Software
Jan Werner
,
G. Baltas
,
+4 authors
M. Polychronakis
ACM Asia Conference on Computer and…
2016
Corpus ID: 680576
Memory disclosure vulnerabilities enable an adversary to successfully mount arbitrary code execution attacks against applications…
Expand
2016
2016
Dissolvable and Biodegradable Resistive Switching Memory Based on Magnesium Oxide
Shiwei Wu
,
Hong Wang
,
+9 authors
Y. Hao
IEEE Electron Device Letters
2016
Corpus ID: 7665350
In this letter, dissolvable and biodegradable resistive switching devices with a cell structure of Mg/MgO/Mg were demonstrated…
Expand
Highly Cited
2014
Highly Cited
2014
Improving the Performance of CA-GMRES on Multicores with Multiple GPUs
I. Yamazaki
,
H. Anzt
,
S. Tomov
,
M. Hoemmen
,
J. Dongarra
IEEE International Parallel and Distributed…
2014
Corpus ID: 521228
The Generalized Minimum Residual (GMRES) method is one of the most widely-used iterative methods for solving nonsymmetric linear…
Expand
Highly Cited
2013
Highly Cited
2013
The Definitive Guide to ARM Cortex-M3 and Cortex-M4 Processors
2013
Corpus ID: 60966330
Review
2008
Review
2008
A survey of certificateless encryption schemes and security models
A. Dent
International Journal of Information Security
2008
Corpus ID: 262380324
This paper surveys the literature on certificateless encryption schemes. In particular, we examine the large number of security…
Expand
2006
2006
Magmatic Evolution and Ascent History of the Aries Micaceous Kimberlite, Central Kimberley Basin, Western Australia: Evidence from Zoned Phlogopite Phenocrysts, and UV Laser 40Ar/39Ar Analysis of…
P. Downes
,
J-A. Wartho
,
B. Griffin
2006
Corpus ID: 129711509
The Neoproterozoic Aries kimberlite was emplaced in the central Kimberley Basin, Western Australia, as a N–NNE-trending series of…
Expand
Highly Cited
2001
Highly Cited
2001
ARM Architecture Reference Manual
D. Seal
2001
Corpus ID: 64907075
From the Publisher: This is the authoritative reference guide to the ARM RISC architecture. Produced by the architects that are…
Expand
Highly Cited
1998
Highly Cited
1998
Safe, Untrusted Agents Using Proof-Carrying Code
G. Necula
,
Peter Lee
Mobile Agents and Security
1998
Corpus ID: 9554630
Proof-Carrying Code (PCC) enables a computer system to determine, automatically and with certainty, that program code provided by…
Expand
Highly Cited
1964
Highly Cited
1964
Architecture of the IBM System/360
G. Amdahl
,
G. Blaauw
,
F. Brooks
IBM Journal of Research and Development
1964
Corpus ID: 10007231
The architecture* of the newly announced IBM System/360 features four innovations: 1. An approach to storage which permits and…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE