We consider a single-address-space system which implements a form of segmentation with paging within the framework of the multithreaded model of program execution. A salient problem of a system of this type is the definition of the set of mechanisms enforcing memory protection. We present a paradigm for the protection system design that is based on the well-known concepts of protection domains and access rights. The resulting environment guarantees an effective separation of the memory resources of the different processes, whose loosely coupled interactions correspond to explicit actions of information sharing. Within the boundaries of a single multithreaded process, a less-stringent protection requirement is to confine the consequences of ...
With reference to a distributed environment consisting of nodes connected in an arbitrary network to...
Many attacks on modern software begin when the application processes untrusted data. Often attackers...
The technological evolution towards extensible software architectures and component-based software d...
With reference to a classical address translation scheme supporting the notion of a paged virtual a...
This paper focuses on memory addressing environments that support the notion of a single address sp...
With reference to a single address space paradigm of memory addressing, we identify a set of mechani...
With reference to an embedded system featuring no support for memory management, we present a model ...
This paper describes a mechanism for protecting against malicious mobile code. As mobile code is lin...
With reference to a distributed system consisting of nodes connected by a local area network, we con...
Aside from malicious software gaining access and corrupting sections of computer memory, even legiti...
A system’s memory access control mechanisms profoundly impact the performance, reliability, security...
Extensibility is a vital property of modern applications. An extension component is downloaded from ...
This dissertation suggests and partially demonstrates that it is feasible to retrofit real privilege...
Accidental overwriting of files or of memory regions belonging to other programs, browsing of person...
Despite the large amount of Byzantine fault-tolerant algorithms for message-passing systems designed...
With reference to a distributed environment consisting of nodes connected in an arbitrary network to...
Many attacks on modern software begin when the application processes untrusted data. Often attackers...
The technological evolution towards extensible software architectures and component-based software d...
With reference to a classical address translation scheme supporting the notion of a paged virtual a...
This paper focuses on memory addressing environments that support the notion of a single address sp...
With reference to a single address space paradigm of memory addressing, we identify a set of mechani...
With reference to an embedded system featuring no support for memory management, we present a model ...
This paper describes a mechanism for protecting against malicious mobile code. As mobile code is lin...
With reference to a distributed system consisting of nodes connected by a local area network, we con...
Aside from malicious software gaining access and corrupting sections of computer memory, even legiti...
A system’s memory access control mechanisms profoundly impact the performance, reliability, security...
Extensibility is a vital property of modern applications. An extension component is downloaded from ...
This dissertation suggests and partially demonstrates that it is feasible to retrofit real privilege...
Accidental overwriting of files or of memory regions belonging to other programs, browsing of person...
Despite the large amount of Byzantine fault-tolerant algorithms for message-passing systems designed...
With reference to a distributed environment consisting of nodes connected in an arbitrary network to...
Many attacks on modern software begin when the application processes untrusted data. Often attackers...
The technological evolution towards extensible software architectures and component-based software d...