Fact-checked by Grok 2 weeks ago
References
-
[1]
Chapter 3 Memory ManagementAlso, the hardware virtual memory mechanisms allow areas of memory to be protected against writing. This protects code and data from being overwritten by rogue ...
-
[2]
Memory Protection - University of IowaPrevent misbehaving programs from damaging the operating system. Prevent misbehaving programs from accessing or damaging data belonging to other programs.<|control11|><|separator|>
-
[3]
Memory Protection - Arm DeveloperMemory protection restricts access to code and data based on execution context, preventing applications from accessing OS data or code.
-
[4]
Memory Protection Keys - The Linux Kernel documentationMemory Protection Keys provide a mechanism for enforcing page-based protections, but without requiring modification of the page tables.
-
[5]
[PDF] Memory ProtectionUser processes safely enter the kernel to access shared OS services. • Virtual memory mapping. OS controls virtual-physical translations for each address space.
-
[6]
[PDF] Memory Protection: Kernel and User Address SpacesMemory Protection: Kernel and. User Address Spaces. Sarah Diesburg ... spaces to achieve fault isolation. • What if your applications are built by ...
-
[7]
Operating Systems: Main MemoryA bit or bits can be added to the page table to classify a page as read-write, read-only, read-write-execute, or some combination of these sorts of things. Then ...
-
[8]
[PDF] History of Protection in Computer Systems - DTICJul 15, 1980 · The idea behind multiprogramming is that the operating system keeps more than one user program resident in main memory at a time. One user ...
-
[9]
Multics--The first seven years - MITHISTORY OF THE DEVELOPMENT. As previously mentioned, the Multics project got under way in the Fall of 1964. The computer equipment to be used was a modified ...
-
[10]
[PDF] The Evolution of the Unix Time-sharing System* - NokiaThis paper presents a brief history of the early development of the Unix operating system. It concentrates on the evolution of the file system, the process ...
-
[11]
[PDF] INTEL 80386 PROGRAMMER'S REFERENCE MANUAL 1986Protected Mode. 2. Real-Address Mode. 3. Virtual 8086 Mode. Protected mode is the natural 32-bit environment of the 80386 processor. In this mode all ...Missing: history | Show results with:history
-
[12]
[PDF] [12] CASE STUDY: WINDOWS NTReliability: NT uses hardware protection for virtual memory and software protection mechanisms for operationg system resources. Compatibility: applications ...
-
[13]
[PDF] Intel Virtualization Technology - UT Computer ScienceAdditional controls allow selective protection of CR0, CR3, and CR4. VT-x includes two controls that support inter- rupt virtualization. When the external ...Missing: introduction | Show results with:introduction
-
[14]
On the effectiveness of address-space randomizationAddress-space randomization is a technique used to fortify systems against buffer overflow attacks. The idea is to introduce artificial diversity by ...Abstract · Information & Contributors · Published In
-
[15]
Deconstructing process isolation - ACM Digital LibraryMost operating systems enforce process isolation through hardware protection mechanisms such as memory segmentation, page mapping, and differentiated user ...
-
[16]
[PDF] Multiprogramming on physical memoryMultiprogramming on physical memory. • Makes it hard to allocate space ... • Isolation is natural. - Can't even name other proc's memory. Page 3 ...
-
[17]
Operating System Privilege: Protection and IsolationThe first step is memory itself. We want to isolate the processes' memory spaces, so that each process can access only its own memory.
-
[18]
Protection - Butler LampsonIt has three major components: a set of objects which we will call X, a set of domains which we will call D, and an access matrix or access function which we ...
-
[19]
[PDF] Access Control Models - Jackson State UniversityDiscretionary Access Control (DAC) Model: The DAC model gives the owner of the object the privilege to grant or revoke access to other subjects. • Mandatory ...
-
[20]
[PDF] Configuring the SELinux Policy - National Security AgencyNSA Security-Enhanced Linux (SELinux) is an implementation of a flexible and fine-grained mandatory access control (MAC) architecture called Flask in the ...<|control11|><|separator|>
-
[21]
[PDF] Segmentation - cs.wisc.eduWhat segmentation allows the OS to do is to place each one of those segments in different parts of physical memory, and thus avoid filling physical memory with ...
-
[22]
[PDF] CHAPTER 3 PROTECTED-MODE MEMORY MANAGEMENTSegmentation provides a mechanism of isolating individual code, data, and stack modules so that multiple programs (or tasks) can run on the same processor ...<|control11|><|separator|>
-
[23]
6.2 Overview of 80386 Protection MechanismsThe protection hardware of the 80386 is an integral part of the memory management hardware. Protection applies both to segment translation and to page ...
-
[24]
Operating Systems Lecture Notes Lecture 15 SegmentsEach segment is a variable-sized chunk of memory. An address is a segment,offset pair. Each segment has protection bits that specify which kind of accesses can ...
-
[25]
x86 Segmentation for the 15-410 StudentSep 8, 2017 · x86 segmentation divides memory into segments, like code, stack, and data. Segment selectors use segment numbers to access descriptor tables, ...
-
[26]
Guide to Understanding SegmentationAs shown in Figure 3-1, segmentation provides a mechanism for dividing the processor's addressable memory space (called the linear address space) into smaller ...
-
[27]
A Hardware Architecture for Implementing Protection Rings - MulticsIn a system which uses segmentation as a memory addressing scheme, protection can be achieved in part by associating concentric rings of decreasing access ...
-
[28]
Memory Management, Segmentation, and Paging - UCSD CSEAppropriate protection and security can be enforced by associating this information with the segment table.
-
[29]
[PDF] Complete Virtual Memory Systems - cs.wisc.eduThe page table entry (PTE) in VAX contains the following bits: a valid bit, a protection field (4 bits), a modify (or dirty) bit, a field reserved for. OS ...
-
[30]
[PDF] Virtual Memory - Computer Systems: A Programmer's PerspectiveIf virtual memory is used improperly, applications can suffer from perplexing and insidious memory- related bugs. For example, a program with a bad pointer can ...Missing: fundamentals | Show results with:fundamentals
-
[31]
Virtual Memory - Cornell: Computer ScienceVirtual memory is a system by which the machine or operating system fools processes running on the machine into thinking that they have a lot more memory to ...Missing: fundamentals | Show results with:fundamentals
-
[32]
[PDF] Virtual Memory - the denning instituteThe address translator also recognized access codes, thus protecting read-only pages from being overwritten. Downloaded by [Peter Denning] at 10 ...
-
[33]
CS 537 Lecture Notes Part 7 PagingThe MMU allows a contiguous region of virtual memory to be mapped to page frames scattered around physical memory making life much easier for the OS when ...
-
[34]
[PDF] Virtual Memory Overview - WashingtonVirtual memory uses virtual addresses (VA) and physical addresses (PA). The MMU translates VA to PA using the TLB and page table. The page table maps virtual ...
-
[35]
[PDF] A Hardware Architecture for Implementing Protection RingsIn a system which usessegmentation as a memory addressing scheme, protection can be achieved in part by associating concentric rings of decreasing access.
-
[36]
[PDF] Intel® 64 and IA-32 Architectures Software Developer's ManualNOTE: The Intel® 64 and IA-32 Architectures Software Developer's Manual consists of nine volumes: Basic Architecture, Order Number 253665; Instruction Set ...
-
[37]
[PDF] Systems Reference Library IBM System/360 Principles of OperationThe manual is useful for individual study, as an instruction aid, and as a machine reference manual. The manual defines System/360 operating princi- ples, ...
-
[38]
What is storage protection? - IBMStorage protection prevents unauthorized alteration and reading of storage, working on 4K pages of real memory, and cannot be altered by application programs.
-
[39]
Memory protection keys - LWN.netMay 13, 2015 · Memory protection keys (MPK) use bits in page tables to assign keys to memory pages, allowing processes to partition memory and control access ...
-
[40]
Capability-based addressing | Communications of the ACMA computer using capability-based addressing may be substantially superior to present systems on the basis of protection, simplicity of programming conventions ...
-
[41]
[PDF] Capability-Based Computer SystemsCapabilities provide (1) a single mechanism to address both primary and secondary memory, and (2) a single mechanism to address both hardware and soft- ware ...
-
[42]
[PDF] The Plessey System 250Capability addressing facilitated sharing among processors, while also restricting each processor's domain to the segments for which it possessed capabilities.
-
[43]
EROS: a fast capability system - ACM Digital LibraryEROS is a capability-based operating system for commodity processors which uses a single level storage model. The single level store's persistence is ...
-
[44]
[PDF] A Capability-based Foundation for Trustless Secure Memory AccessAug 9, 2023 · Capability-based memory isolation is a promising new ar- chitectural primitive. Software can access low-level memory.
-
[45]
CS 513 System Security -- LReview and Revocation for CapabilitiesTo perform review in a capability-based system is more difficult. All of the capabilities could be printed, but from that information it would still be hard to ...
-
[46]
[PDF] Efficient and Provable Local Capability Revocation using ...Unfortunately, local capability revocation is unrealistic in practice because large amounts of stack memory need to be cleared as a security precaution. In this ...
-
[47]
[PDF] paging.pdf - cs.PrincetonPaged Segmentation. Silberschatz. & Peterson. Swapping. • What happens if cumulative sizes of segments exceeds virtual memory? Page 6. 6. Swapping to Disk. • If ...
-
[48]
[PDF] The Development of a Segmented Memory Manager for the ... - DTICThis thesis rsoorts the development of a segmented memory manager for the UNIX operating system on a PDP-11/50 minicomputer. Considered in detail is the ...
-
[49]
Memory Protection - Win32 apps | Microsoft LearnJan 7, 2021 · Copy-on-write protection is an optimization that allows multiple processes to map their virtual address spaces such that they share a physical page.Missing: NT history
-
[50]
[PDF] Effective Memory Protection Using Dynamic TaintingNov 9, 2007 · In this paper, we present a new technique based on dynamic taint- ing for protecting programs from illegal memory accesses. When memory is ...
-
[51]
[PDF] Dynamic Taint Analysis for Automatic Detection ... - People @EECSTaintCheck design and implementation TaintCheck is a novel mechanism that uses dynamic taint analysis to detect when a vulnerability such as a buffer overrun ...
-
[52]
[PDF] Design and Implementation of a Dynamic Information Flow Tracking ...Our focus has been on deriving an implementation of DIFT for a RISC-V core that protects IoT applications against memory-corruptions attacks while presenting no ...
-
[53]
Page Tables - The Linux Kernel documentationPage tables map virtual addresses as seen by the CPU into physical addresses as seen on the external memory bus. Linux defines page tables as a hierarchy.
-
[54]
[PDF] Sharing Page Tables in the Linux KernelDuring fork, every pte en- try is copied to the new page table. Data pages that can't be fully shared are marked as “copy on write.” Marking a page as copy on ...
-
[55]
[PDF] PaX: Twelve Years of Securing Linux - grsecurityOct 10, 2012 · PaX. Future. The Solutions. Deployment. ▷ Mandatory Access Control (policies). ▷ Linux Security Modules (LSM). ▷ Apparmor, SELinux, Smack ...Missing: paper | Show results with:paper
-
[56]
Security Technologies: ExecShield - Red HatJul 25, 2018 · ExecShield, a Red Hat technology, protects systems from memory corruption by segmenting memory and using address space layout randomization.Missing: PaX | Show results with:PaX
-
[57]
[PDF] Integrating Flexible Support for Security Policies into the Linux ...This paper describes the security architecture, security mechanisms, application programming interface, secu rity policy configuration, and performance of ...
-
[58]
CreateProcessA function (processthreadsapi.h) - Win32 appsFeb 8, 2023 · Creates a new process and its primary thread. The new process runs in the security context of the calling process.
-
[59]
Mitigate threats by using Windows 10 security featuresDec 31, 2017 · Memory protection options provide specific mitigations against malware that attempts to manipulate memory in order to gain control of a system.Address Space Layout... · Windows Heap Protections · Kernel Pool Protections<|control11|><|separator|>
-
[60]
On the effectiveness of DEP and ASLR - MicrosoftDec 8, 2010 · DEP (Data Execution Prevention) and ASLR (Address Space Layout Randomization) have proven themselves to be important and effective ...<|control11|><|separator|>
-
[61]
Data Execution Prevention - Win32 apps - Microsoft LearnMay 1, 2023 · Data Execution Prevention (DEP) is a memory protection feature that marks memory as non-executable, preventing code from running from data ...
-
[62]
Creating Guard Pages - Win32 apps - Microsoft LearnJan 7, 2021 · A guard page is a one-shot alarm for memory access, created by setting PAGE_GUARD. Accessing it raises an exception, and the guard status is ...
-
[63]
Memory Protection Constants (WinNT.h) - Win32 - Microsoft LearnMay 20, 2022 · The following are the memory-protection options; you must specify one of the following values when allocating or protecting a page in memory.
-
[64]
Control Flow Guard for platform security - Win32 apps | Microsoft LearnDec 17, 2024 · Control Flow Guard (CFG) is a highly-optimized platform security feature that was created to combat memory corruption vulnerabilities.What is Control Flow Guard? · How Can I Enable CFG?
-
[65]
Access Tokens - Win32 apps - Microsoft LearnJul 8, 2025 · An access token is an object that describes the security context of a process or thread. The information in a token includes the identity and privileges of the ...Missing: kernel | Show results with:kernel
-
[66]
Windows Kernel-Mode Security Reference Monitor - Microsoft LearnSep 24, 2025 · Learn about the Windows Security Reference Monitor and how to use its routines for access control in kernel-mode drivers.Missing: protection | Show results with:protection
-
[67]
Running 32-bit Applications - Win32 apps - Microsoft LearnAug 19, 2020 · WOW64, an x86 emulator, allows 32-bit apps to run on 64-bit Windows. The system isolates them, but 32-bit apps can't load 64-bit DLLs.
-
[68]
Enable virtualization-based protection of code integrityAug 15, 2025 · Memory integrity can be turned on in Windows Security settings and found at Windows Security > Device security > Core isolation details > Memory integrity.Memory integrity features · How to turn on memory integrity
-
[69]
Virtualization-based Security (VBS) - Microsoft LearnFeb 27, 2025 · Virtualization-based security, or VBS, uses hardware virtualization and the Windows hypervisor to create an isolated virtual environment that becomes the root ...
-
[70]
Memory Protection Unit (MPU) - Arm DeveloperThe MPU is a programmable device that can define memory access permissions, such as privileged access only, and memory attributes, for example Cacheability.
-
[71]
[PDF] Deterministic Memory Hierarchy and Virtualization for Modern Multi ...Abstract—One of the main predictability bottlenecks of mod- ern multi-core embedded systems is contention for access to shared memory resources.
-
[72]
Memory Protection Unit (MPU) Support - FreeRTOS™FreeRTOS MPU ports enable microcontroller applications to be more robust and more secure by: first, enabling tasks to run in either privileged or unprivileged ...
-
[73]
Memory Protection Unit - Cortex-M0+ Devices Generic User GuideThe MPU divides memory into regions, defining access permissions and attributes. It can cause a HardFault if a prohibited access occurs.
-
[74]
Chapter 5. Memory Protection Unit - Cortex-M4 - Arm DeveloperThis chapter describes the processor Memory Protection Unit (MPU). It contains the following sections: About the MPU · MPU functional description.
-
[75]
[PDF] Mitigation of interference in Multicore Processors - Wind River SystemsFigure 12 – The combination of cache partitioning and the use of certain RAM addresses can mitigate interference in the memory system through space partitioning ...
-
[76]
[PDF] seL4: Formal Verification of an OS Kernel - acm sigopsseL4 is a formally verified, general-purpose OS kernel, the first of its kind, designed for functional correctness and is a member of the L4 microkernel family.
-
[77]
[PDF] seL4: Formal Verification of an Operating-System KernelABSTRACT. We report on the formal, machine-checked verification of the seL4 microkernel from an abstract specification down to its C implementation.
-
[78]
[PDF] Modular Avionics Safety-Critical Software Development for IntegratedIn VxWorks 653, the module OS performs ARINC 653 scheduling of the individual partitions. Within each time slot, the partition OS uses the VxWorks scheduler to ...<|separator|>
-
[79]
Benefits of Using the Memory Protection Unit - FreeRTOS™Feb 16, 2021 · MPU regions can be modified on a per-task basis; each task can have its own unique set of regions that are configured when the task is moved to ...
-
[80]
[PDF] Capability memory protection for embedded systemsThis dissertation explores the use of capability security hardware and software in real-time and latency-sensitive embedded systems, to address existing memory ...
-
[81]
[PDF] Protecting Cryptographic Libraries against Side-Channel and Code ...Dec 26, 2024 · Memory- buffer vulnerabilities are among the most common security vulnerabilities, comprising approximately 20% of the reported ...Missing: Spectre | Show results with:Spectre
-
[82]
[PDF] Return-Oriented Programming: Systems, Languages, and ApplicationsIn this paper, we present a new form of attack, dubbed return-oriented programming, that categorically evades W+X protections. Attacks using our technique ...
-
[83]
[PDF] The Morris worm: A fifteen-year perspective - UMD Computer Sciencedid not need authentication, and the fingerd application was vulnerable to a buffer overrun exploit, something of a novelty at the time. Many systems did ...
-
[84]
CWE-367: Time-of-check Time-of-use (TOCTOU) Race ConditionThis can happen with shared resources such as files, memory, or even variables in multithreaded programs. + Applicable Platforms. Section Help This listing ...
-
[85]
[1801.01203] Spectre Attacks: Exploiting Speculative Execution - arXivJan 3, 2018 · This paper describes practical attacks that combine methodology from side channel attacks, fault attacks, and return-oriented programming that can read ...
-
[86]
4. Memcheck: a memory error detector - ValgrindMemcheck is a memory error detector. It can detect the following problems that are common in C and C++ programs. Incorrect freeing of heap memory.Missing: protection | Show results with:protection
-
[87]
ViK: Practical Mitigation of Temporal Memory Safety Violations ...Mar 4, 2022 · In kernel UAF attacks, the attacker has only one chance: The kernel will panic upon failed attacks due to an invalid memory access via a ...
-
[88]
[PDF] Real-World Buffer Overflow Protection for Userspace & KernelspaceDynamic Information Flow Tracking (DIFT) is a practi- cal platform for preventing a wide range of security at- tacks from memory corruptions to SQL injections.
-
[89]
Support for Intel® Memory Protection Extensions (Intel® MPX)...Jul 16, 2021 · Describes Intel® MPX and how to find out if the technology is supported by a processor.
-
[90]
12. Intel(R) Memory Protection Extensions (MPX)Intel MPX provides hardware features that can be used in conjunction with compiler changes to check memory references, for those references whose compile-time ...
-
[91]
Armv8-A architecture: 2016 additions - Arm DeveloperOct 26, 2016 · Pointer authentication · PAC value creation that write the value to the uppermost bits in a destination register alongside an address pointer ...
-
[92]
[PDF] Pointer Authentication on ARMv8.3 - QualcommIn this document, we have described the design of the ARM Pointer Authentication extensions newly introduced in ARMv8.3-A specification. We have presented ...
-
[93]
AMD Secure Encrypted Virtualization (SEV)AMD Secure Encrypted Virtualization (SEV) uses one key per virtual machine to isolate guests and the hypervisor, managed by the AMD Secure Processor.
-
[94]
AMD Secure Encrypted Virtualization (SEV) — QEMU documentationSEV is an extension to the AMD-V architecture which supports running encrypted virtual machines (VMs) under the control of KVM.
-
[95]
[PDF] Control-Flow Integrity Principles, Implementations, and ApplicationsThis paper describes and studies one mitigation technique, the enforcement of Control-. Flow Integrity (CFI), that aims to meet these standards for ...
-
[96]
[PDF] PAC it up: Towards Pointer Integrity using ARM Pointer AuthenticationPointers with PACs can be authenticated either as they are loaded from memory, or immediately before they are used. We refer to these as on-load and on-use ...
-
[97]
Mitigating Spectre with Site Isolation in ChromeJul 11, 2018 · To better mitigate these attacks, we're excited to announce that Chrome 67 has enabled a security feature called Site Isolation on Windows, Mac ...
-
[98]
[PDF] Performance Evaluation of Intel EPT Hardware Assist - VMwareRecently Intel introduced its second generation of hardware support that incorporates MMU virtualization, called Extended Page Tables (EPT). We evaluated EPT ...
-
[99]
AI-Driven Anomaly Detection for Securing IoT Devices in 5G ... - MDPIThis paper proposes a novel AI-driven anomaly detection framework designed to enhance cybersecurity in IoT-enabled smart cities operating over 5G networks.
-
[100]
NIST Releases First 3 Finalized Post-Quantum Encryption StandardsAug 13, 2024 · NIST has finalized its principal set of encryption algorithms designed to withstand cyberattacks from a quantum computer.