Tagged articles
9 articles
Page 1 of 1
Java Tech Enthusiast
Java Tech Enthusiast
Oct 11, 2025 · Backend Development

How MyBatis Interceptors Can Safeguard Your Java Service from Out‑of‑Memory Crashes

This article explains how oversized database query results can cause JVM memory spikes and OOM errors, and shows how to use MyBatis interceptors to monitor, limit, and protect memory consumption with non‑intrusive code, Prometheus metrics, and configurable thresholds, ultimately improving system stability and performance.

BackendInterceptorMyBatis
0 likes · 20 min read
How MyBatis Interceptors Can Safeguard Your Java Service from Out‑of‑Memory Crashes
Sanyou's Java Diary
Sanyou's Java Diary
Jul 31, 2025 · Databases

How MyBatis Interceptors Can Safeguard Your Java Service from Memory Overruns

This article explains how oversized database query results can cause JVM heap spikes, frequent Full GC, or OOM crashes in Java services, and demonstrates a non‑intrusive MyBatis interceptor solution that monitors, grades, and blocks risky queries while exposing Prometheus metrics for proactive alerting and capacity planning.

InterceptorMyBatisPrometheus
0 likes · 18 min read
How MyBatis Interceptors Can Safeguard Your Java Service from Memory Overruns
Liangxu Linux
Liangxu Linux
Sep 20, 2023 · Information Security

How to Secure Your Bootloader: Image Verification, Signature Authentication, and Memory Protection

This article explains essential bootloader security mechanisms—including image integrity checks, digital signature verification, hardware/software memory protection, and the use of read‑only storage—while highlighting practical implementation tips for STM32 and the trade‑offs between security and system complexity.

bootloaderdigital signatureembedded
0 likes · 8 min read
How to Secure Your Bootloader: Image Verification, Signature Authentication, and Memory Protection
Liangxu Linux
Liangxu Linux
Apr 24, 2023 · Fundamentals

How MMU Enables Virtual Memory, Protection, and Process Isolation

The article explains the role of a Memory Management Unit (MMU) in translating virtual to physical addresses, managing page tables, providing memory protection and sharing, and why modern operating systems like Linux rely on it while some embedded systems can operate without one.

MMUOperating SystemsPage Table
0 likes · 7 min read
How MMU Enables Virtual Memory, Protection, and Process Isolation
vivo Internet Technology
vivo Internet Technology
Apr 5, 2023 · Information Security

TrustZone Architecture: Hardware-Level Privacy Protection for Smartphones

TrustZone implements a hardware‑level privacy shield for smartphones by partitioning CPU, bus, memory, peripherals and interrupts into a Secure World and a Normal World, using ARMv8 exception levels and extensions such as SCR, TZPC, TZASC, GIC and MMU to isolate user data from non‑secure software.

ARM SecurityMobile SecurityTEE
0 likes · 12 min read
TrustZone Architecture: Hardware-Level Privacy Protection for Smartphones
OPPO Amber Lab
OPPO Amber Lab
Aug 31, 2020 · Information Security

Android Kernel Hooking: Bypassing GKI Limits & Memory Protection

This article examines the security challenges of Android and IoT devices built on ARM/ARM64 platforms, explains how Google's Generic Kernel Image (GKI) restricts kernel modifications, and provides detailed techniques—including memory‑page attribute manipulation, remap_pfn_range, and assembly‑level hook implementations—to safely inject custom functionality into the kernel while addressing write‑protection, concurrency, and module‑unloading issues.

ARMAndroidGKI
0 likes · 15 min read
Android Kernel Hooking: Bypassing GKI Limits & Memory Protection
MaGe Linux Operations
MaGe Linux Operations
Dec 13, 2018 · Operations

How to Hook Kernel Functions Safely on Modern Linux Systems

This article explains why traditional function‑hooking tricks fail on modern Linux due to executable‑memory protections, and presents a step‑by‑step method using page‑table remapping and the kernel's text_poke utilities to replace kernel functions safely, complete with code examples and a diagram.

Kernel Modulefunction hookingkernel
0 likes · 10 min read
How to Hook Kernel Functions Safely on Modern Linux Systems