Protection ring

Known as: Ring 0, Ring -1 (computer security), Ring 1 
In computer science, hierarchical protection domains, often called protection rings, are mechanisms to protect data and functionality from faults (by… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
The prevalence of mobile platforms, the large market share of Android, plus the openness of the Android Market makes it a hot… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2011
Highly Cited
2011
New storage-class memory (SCM) technologies, such as phase-change memory, STT-RAM, and memristors, promise user-level access to… (More)
Is this relevant?
Highly Cited
2011
Highly Cited
2011
This paper presents S2E, a platform for analyzing the properties and behavior of software systems. We demonstrate S2E's use in… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Commodity operating systems entrusted with securing sensitive data are remarkably large and complex, and consequently, frequently… (More)
Is this relevant?
Highly Cited
2007
Highly Cited
2007
We propose SecVisor, a tiny hypervisor that ensures code integrity for commodity OS kernels. In particular, SecVisor ensures that… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2007
Highly Cited
2007
We propose minimalist new hardware additions to a microprocessor chip that protect cryptographic keys in portable computing… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 5
Is this relevant?
Highly Cited
1999
Highly Cited
1999
Under high loads, a Web server may be servicing many hundreds of connections concurrently. In traditional Web servers, the… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 5
Is this relevant?
1999
1999
We have implemented an image combining architecture that allows distributed rendering of a partitioned data set at interactive… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
1999
Highly Cited
1999
Pebble is a new operating system designed with the goals of flexibility, safety, and performance. Its architecture combines a set… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 2
Is this relevant?