Results 11 to 20 of about 1,699,422 (313)
Position Paper:Defending Direct Memory Access with CHERI Capabilities [PDF]
We propose new solutions that can efficiently address the problem of malicious memory access from pluggable computer peripherals and microcontrollers embedded within a system-on-chip. This problem represents a serious emerging threat to total-system computer security.
Markettos, A Theodore +5 more
openaire +2 more sources
Design and Implementation of a Direct Memory Access Controller for Embedded Applications
In this paper, we propose a design and implementation of a Direct Memory Access Controller (DMAC) as a part of an SoC. The main purpose of the DMAC design is to integrate it into a System on a Chip (SoC) for the exchange of a large volume of data ...
Mohammed Altaf Ahmed +2 more
doaj +2 more sources
Hardware Based Security Enhanced Direct Memory Access [PDF]
This paper presents an approach to prevent memory attacks enabled by DMA. DMA is a technique that is frequently used to release processors from simple memory transfers. DMA transfers are usually performed during idle times of the bus. A disadvantage of DMA transfers is that they are primarily unsupervised by anti malware agents. After the completion of
Eckert, Marcel +2 more
openaire +2 more sources
Dynamically reconfigurable computing platforms provide promising methods for dynamic management of hardware resources, power, and performance. Yet, progress in dynamically reconfigurable computing is fundamentally limited by the reconfiguration time ...
John C. Hoffman, Marios S. Pattichis
doaj +2 more sources
Memory Management Support for Multi-Programmed Remote Direct Memory Access (RDMA) Systems [PDF]
Current operating systems offer basic support for network interface controllers (NICs) supporting remote direct memory access (RDMA). Such support typically consists of a device driver responsible for configuring communication channels between the device and user-level processes but not involved in data transfer.
K. Magoutis
openaire +2 more sources
Validating direct memory access interfaces with conformance checking [PDF]
Li Lei, Kai Cong, Zhenkun Yang, Fei Xie
openaire +2 more sources
A Remote Direct Memory Access Protocol Specification [PDF]
R. Recio +4 more
openaire +2 more sources
Remote Direct Memory Access (RDMA) Protocol Extensions [PDF]
H. Shah +4 more
openaire +2 more sources
Enhanced Remote Direct Memory Access (RDMA) Connection Establishment [PDF]
R. Sharp, S. Wise
openaire +2 more sources
Memory bandwidth utilization has become the key performance bottleneck for state-of-the-art variants of neural network kernels. Current structures such as depth-wise, point-wise and atrous convolutions have already introduced diverse and discontinuous ...
Zheng Wang +12 more
semanticscholar +1 more source

