Matches in DBpedia 2014 for { <http://dbpedia.org/resource/Executable_space_protection> ?p ?o. }
Showing items 1 to 19 of
19
with 100 items per page.
- Executable_space_protection abstract "In computer security, executable space protection is the marking of memory regions as non-executable, such that an attempt to execute machine code in these regions will cause an exception. It makes use of hardware features such as the NX bit.The Burroughs 5000 offered hardware support for executable space protection when it was introduced in 1961; that capability was retained in its successors at least through 2006. In its implementation of tagged architecture, each word of memory had an associated, hidden tag bit designating it code or data. Thus, user programs cannot write or even read a program word, and data words cannot be executed.If an operating system can mark some or all writable regions of memory as non-executable, it may be able to prevent the stack and heap memory areas from being executable. This helps to prevent certain buffer overflow exploits from succeeding, particularly those that inject and execute code, such as the Sasser and Blaster worms. These attacks rely on some part of memory, usually the stack, being both writable and executable; if it is not, the attack fails.".
- Executable_space_protection wikiPageExternalLink aslr.txt.
- Executable_space_protection wikiPageExternalLink ?v=2&a=4.
- Executable_space_protection wikiPageExternalLink dep-evasion-technique.html.
- Executable_space_protection wikiPageID "3675382".
- Executable_space_protection wikiPageRevisionID "586763716".
- Executable_space_protection hasPhotoCollection Executable_space_protection.
- Executable_space_protection subject Category:Operating_system_security.
- Executable_space_protection comment "In computer security, executable space protection is the marking of memory regions as non-executable, such that an attempt to execute machine code in these regions will cause an exception. It makes use of hardware features such as the NX bit.The Burroughs 5000 offered hardware support for executable space protection when it was introduced in 1961; that capability was retained in its successors at least through 2006.".
- Executable_space_protection label "Executable space protection".
- Executable_space_protection label "Protection de l'espace exécutable".
- Executable_space_protection label "実行保護".
- Executable_space_protection sameAs Protection_de_l'espace_exécutable.
- Executable_space_protection sameAs 実行保護.
- Executable_space_protection sameAs m.09ttt7.
- Executable_space_protection sameAs Q3407921.
- Executable_space_protection sameAs Q3407921.
- Executable_space_protection wasDerivedFrom Executable_space_protection?oldid=586763716.
- Executable_space_protection isPrimaryTopicOf Executable_space_protection.