Skip to search formSkip to main contentSkip to account menu

Memory protection

Known as: Mprotect, MPK, Secure memory 
Memory protection is a way to control memory access rights on a computer, and is a part of most modern processor architectures and operating systems… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
Control-flow hijacking is the principal method for code-reuse techniques like Return-oriented Programming (ROP) and Jump-oriented… 
Highly Cited
2016
Highly Cited
2016
Memory disclosure vulnerabilities enable an adversary to successfully mount arbitrary code execution attacks against applications… 
2016
2016
In this letter, dissolvable and biodegradable resistive switching devices with a cell structure of Mg/MgO/Mg were demonstrated… 
Highly Cited
2014
Highly Cited
2014
The Generalized Minimum Residual (GMRES) method is one of the most widely-used iterative methods for solving nonsymmetric linear… 
Highly Cited
2013
Review
2008
Review
2008
This paper surveys the literature on certificateless encryption schemes. In particular, we examine the large number of security… 
2006
2006
The Neoproterozoic Aries kimberlite was emplaced in the central Kimberley Basin, Western Australia, as a N–NNE-trending series of… 
Highly Cited
2001
Highly Cited
2001
From the Publisher: This is the authoritative reference guide to the ARM RISC architecture. Produced by the architects that are… 
Highly Cited
1998
Highly Cited
1998
Proof-Carrying Code (PCC) enables a computer system to determine, automatically and with certainty, that program code provided by… 
Highly Cited
1964
Highly Cited
1964
The architecture* of the newly announced IBM System/360 features four innovations: 1. An approach to storage which permits and…