Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,014,585 papers from all fields of science
Search
Sign In
Create Free Account
Memory protection
Known as:
Mprotect
, MPK
, Secure memory
Expand
Memory protection is a way to control memory access rights on a computer, and is a part of most modern processor architectures and operating systems…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
48 relations
Address space layout randomization
Atari
C dynamic memory allocation
Capability-based addressing
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Bacterial AvrRpt 2-Like Cysteine Proteases Block Activation of the Arabidopsis Mitogen-Activated Protein Kinases , MPK 4 and MPK 111 [ OPEN ]
Lennart Eschen-Lippold
,
Xiyuan Jiang
,
+5 authors
Justin Lee
2016
Corpus ID: 19993438
Department of Stress and Developmental Biology, Leibniz Institute of Plant Biochemistry, Halle/Saale, D-06120 Germany (L.E.-L., X…
Expand
2012
2012
Heavy Ion Sensitivity of 16/32-Gbit NAND-Flash and 4-Gbit DDR3 SDRAM
K. Grürmann
,
M. Herrmann
,
+4 authors
V. Ferlet-Cavrois
IEEE Radiation Effects Data Workshop
2012
Corpus ID: 7215744
16/32-Gbit NAND-Flash and 4-Gbit DDR3 SDRAM memories have been tested under heavy ion irradiation. At high LET, 25nm NAND-Flash…
Expand
2009
2009
CODE OBFUSCATION AND VIRUS DETECTION
A. Venkatesan
2009
Corpus ID: 15703122
Typically, computer viruses and other malware are detected by searching for a string of bits which is found in the virus or…
Expand
2009
2009
The Definitive Guide to the ARM Cortex-M3, Second Edition
Joseph Yiu
2009
Corpus ID: 116788351
2008
2008
Scheduling execution of credentials in constrained secure environments
Jan-Erik Ekberg
,
N. Asokan
,
Kari Kostiainen
,
A. Rantala
Scalable Trusted Computing
2008
Corpus ID: 17478448
A new inexpensive approach for using credentials in a secure manner has become available due to the fact that several types of…
Expand
2007
2007
An Execution Model for Hardware/Software Compilation and its System-Level Realization
H. Lange
,
A. Koch
International Conference on Field-Programmable…
2007
Corpus ID: 17443244
We introduce a new execution model for orchestrating the interaction between the conventional processor and the re-configurable…
Expand
2004
2004
No Heap Remote Objects: Leaving Out Garbage Collection at the Server Side
P. Basanta-Val
,
M. García-Valls
,
I. Estévez-Ayres
OTM Workshops
2004
Corpus ID: 19318432
This paper presents an approach to provide real-time support for Java RMI integrating it with the RTSJ memory model to leave out…
Expand
2004
2004
Mondriaan Memory Protection
Emmett Witchel
2004
Corpus ID: 36884348
Reliability and security are quickly becoming users' biggest concern due to the increasing reliance on computers in all areas of…
Expand
2003
2003
Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card
H. Scherzer
,
R. Canetti
,
P. Karger
,
H. Krawczyk
,
T. Rabin
,
David C. Toll
European Symposium on Research in Computer…
2003
Corpus ID: 398156
This paper presents an authentication protocol for high-assurance smart card operating systems that support download of mutually…
Expand
2001
2001
Automated and portable native code isolation
G. Czajkowski
,
Laurent Daynès
,
M. Wolczko
Proceedings - International Symposium on Software…
2001
Corpus ID: 7406163
The coexistence of programs written in a safe language with user-supplied unsafe (native) code is convenient (e.g., it enables…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE