Sciweavers

213 search results - page 28 / 43
» Hardware Transactional Memory with Operating System Support,...
Sort
View
ASPLOS
2006
ACM
15 years 9 months ago
Architectural support for software-based protection
Control-Flow Integrity (CFI) is a property that guarantees program control flow cannot be subverted by a malicious adversary, even if the adversary has complete control of data m...
Mihai Budiu, Úlfar Erlingsson, Martí...
HIPEAC
2007
Springer
15 years 10 months ago
Compiler-Assisted Memory Encryption for Embedded Processors
A critical component in the design of secure processors is memory encryption which provides protection for the privacy of code and data stored in off-chip memory. The overhead of ...
Vijay Nagarajan, Rajiv Gupta, Arvind Krishnaswamy
128
Voted
ECOOP
2010
Springer
15 years 8 months ago
Reasoning about the Implementation of Concurrency Abstractions on x86-TSO
ncy Abstractions on x86-TSO Scott Owens University of Cambridge Abstract. With the rise of multi-core processors, shared-memory concurrency has become a widespread feature of compu...
Scott Owens
IISWC
2008
IEEE
15 years 10 months ago
Temporal streams in commercial server applications
Commercial server applications remain memory bound on modern multiprocessor systems because of their large data footprints, frequent sharing, complex non-strided access patterns, ...
Thomas F. Wenisch, Michael Ferdman, Anastasia Aila...
OSDI
2008
ACM
16 years 4 months ago
Difference Engine: Harnessing Memory Redundancy in Virtual Machines
Virtual machine monitors (VMMs) are a popular platform for Internet hosting centers and cloud-based compute services. By multiplexing hardware resources among virtual machines (VM...
Diwaker Gupta, Sangmin Lee, Michael Vrable, Stefan...