Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,139,760 papers from all fields of science
Search
Sign In
Create Free Account
Memory protection
Known as:
Mprotect
, MPK
, Secure memory
Expand
Memory protection is a way to control memory access rights on a computer, and is a part of most modern processor architectures and operating systems…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
48 relations
Address space layout randomization
Atari
C dynamic memory allocation
Capability-based addressing
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
ZnO-Based Physically Transient and Bioresorbable Memory on Silk Protein
Fang Song
,
Hong Wang
,
+5 authors
Y. Hao
IEEE Electron Device Letters
2018
Corpus ID: 11438943
In this letter, physically transient and fully bioresorbable resistive switching devices based on ZnO are proposed, with…
Expand
2016
2016
Exploiting the Physical Disparity: Side-Channel Attacks on Memory Encryption
Thomas Unterluggauer
,
S. Mangard
International Workshop on Constructive Side…
2016
Corpus ID: 15530401
Memory and disk encryption is a common measure to protect sensitive information in memory from adversaries with physical access…
Expand
2012
2012
Heavy Ion Sensitivity of 16/32-Gbit NAND-Flash and 4-Gbit DDR3 SDRAM
K. Grürmann
,
M. Herrmann
,
+4 authors
V. Ferlet-Cavrois
IEEE Radiation Effects Data Workshop
2012
Corpus ID: 7215744
16/32-Gbit NAND-Flash and 4-Gbit DDR3 SDRAM memories have been tested under heavy ion irradiation. At high LET, 25nm NAND-Flash…
Expand
2009
2009
CODE OBFUSCATION AND VIRUS DETECTION
A. Venkatesan
2009
Corpus ID: 15703122
Typically, computer viruses and other malware are detected by searching for a string of bits which is found in the virus or…
Expand
2008
2008
Scheduling execution of credentials in constrained secure environments
Jan-Erik Ekberg
,
N. Asokan
,
Kari Kostiainen
,
A. Rantala
Scalable Trusted Computing
2008
Corpus ID: 17478448
A new inexpensive approach for using credentials in a secure manner has become available due to the fact that several types of…
Expand
2005
2005
Trade-offs in protecting storage: a meta-data comparison of cryptographic, backup/versioning, immutable/tamper-proof, and redundant storage solutions
Joseph A. Tucek
,
P. Stanton
,
Elizabeth Haubert
,
Ragib Hasan
,
L. Brumbaugh
,
W. Yurcik
IEEE Conference on Mass Storage Systems and…
2005
Corpus ID: 13938180
Modern storage systems are responsible for increasing amounts of data and the value of the data itself is growing in importance…
Expand
2005
2005
OpenGL multipipe SDK: a toolkit for scalable parallel rendering
Praveen Bhaniramka
,
Philippe C. D. Robert
,
Stefan Eilemann
VIS 05. IEEE Visualization, .
2005
Corpus ID: 17158153
We describe OpenGL multipipe SDK (MPK), a toolkit for scalable parallel rendering based on OpenGL. MPK provides a uniform…
Expand
2004
2004
No Heap Remote Objects: Leaving Out Garbage Collection at the Server Side
P. Basanta-Val
,
M. García-Valls
,
I. Estévez-Ayres
OTM Workshops
2004
Corpus ID: 19318432
This paper presents an approach to provide real-time support for Java RMI integrating it with the RTSJ memory model to leave out…
Expand
2003
2003
Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card
H. Scherzer
,
R. Canetti
,
P. Karger
,
H. Krawczyk
,
T. Rabin
,
David C. Toll
European Symposium on Research in Computer…
2003
Corpus ID: 398156
This paper presents an authentication protocol for high-assurance smart card operating systems that support download of mutually…
Expand
2001
2001
Automated and portable native code isolation
G. Czajkowski
,
Laurent Daynès
,
M. Wolczko
Proceedings - International Symposium on Software…
2001
Corpus ID: 7406163
The coexistence of programs written in a safe language with user-supplied unsafe (native) code is convenient (e.g., it enables…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE