Search

Search Funnelback University

Search powered by Funnelback
21 - 30 of 94 search results for `Peter Watson`
  1. Fully-matching results

  2. Position Paper:Defending Direct Memory Access with CHERI Capabilities

    https://www.cl.cam.ac.uk/research/security/ctsrd/pdfs/2020hasp-cheri-dma.pdf
    18 Feb 2022: Theodore Markettos, John Baldwin, Ruslan Bukin, Peter G. Neumann,Simon W. Moore, and Robert N. ... HASP’20, October 2020, Online A. Theodore Markettos, John Baldwin, Ruslan Bukin, Peter G.
  3. CHERIvoke: Characterising Pointer Revocation using CHERI Capabilities …

    https://www.cl.cam.ac.uk/research/security/ctsrd/pdfs/201910micro-cheri-temporal-safety.pdf
    18 Feb 2022: Peter RuggUniversity of Cambridge. Peter G. NeumannSRI International. Simon W. MooreUniversity of Cambridge. ... Filardo,Michael Roe, Alexander Richardson, Peter Rugg, Peter G. Neumann, SimonW. Moore, Robert N.
  4. 20160423-cheri-microkernel-workshop

    https://www.cl.cam.ac.uk/research/security/ctsrd/cheri/workshops/pdfs/20160423-cheri-microkernel-workshop.pdf
    18 Feb 2022: Moore. University of Cambridge. Peter G. NeumannSRI International. CHERI Microkernel Workshop – 23 April 2016. ... CHERI models Simon Moore. CHERI C compiler David Chisnall. CheriBSD OS model Robert Watson.
  5. Developing a Test Suite for Transient-Execution Attacks on RISC-V and …

    https://www.cl.cam.ac.uk/research/security/ctsrd/pdfs/202106-carrv-transient-execution.pdf
    18 Feb 2022: M. Watson, Alexander Richardson, Peter G. Neumann,Simon W. Moore, John Baldwin, David Chisnall, Jessica Clarke, Nathaniel WesleyFilardo, Khilan Gudka, Alexandre Joannou, Ben Laurie, A. ... RISC-V Foundation. Volume II: Privileged Architecture. [19]
  6. 20190414-cheriabi

    https://www.cl.cam.ac.uk/research/security/ctsrd/pdfs/20190414-cheriabi.pdf
    18 Feb 2022: CheriABIEnforcing/Valid/Pointer/Provenance/and/Minimizing/Pointer/Privilege/in/the/POSIX/C/Run?time/Environment. ... David/Chisnall,. James/Clarke,/Nathaniel/Wesley/Filardo,/Khilan
  7. Computer Science & Technology Advanced Topics inComputer…

    https://www.cl.cam.ac.uk/teaching/2223/R265/slides/cheri.pdf
    3 Nov 2022: Run-time Environment. Brooks Davisbrooks.davis@sri.com. Robert N. M. Watson†robert.watson@cl.cam.ac.uk. Alexander Richardson†alexander.richardson@cl.cam.ac.uk. Peter G. ... Alfredo Mazzinghi†am2419@cam.ac.uk. Edward Tomasz
  8. Exploring C Semantics and Pointer Provenance

    https://www.cl.cam.ac.uk/research/security/ctsrd/pdfs/201901-popl-cerberus.pdf
    18 Feb 2022: F. Gomes, Brooks Davis, Stephen Kell, Alexander Richardson, Robert N. M.Watson, and Peter Sewell. ... 67:12 Memarian, Gomes, Davis, Kell, Richardson, Watson, Sewell. usually involving one or more linking steps.
  9. Memory safety with CHERI capabilities: security analysis, language…

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-975.pdf
    7 Nov 2022: To all members of theCHERI project, and especially Alex Richardson, Jessica Clarke, Peter Neumann, and JohnBaldwin, for making this work possible. ... Reports. • Peter G. Neumann and Brett F. Gutstein. CHERI’s mitigation of security vulnera-bilities.
  10. MineSweeper: A ``Clean Sweep'' for Drop-In Use-after-Free…

    https://www.cl.cam.ac.uk/~tmj32/papers/docs/erdos22-asplos.pdf
    1 Oct 2022: MineSweeper: A “Clean Sweep” for Drop-In Use-after-FreePrevention. Márton ErdősUniversity of Cambridge. Cambridge, UKme412@cam.ac.uk. Sam AinsworthUniversity of Edinburgh. Edinburgh, UKsam.ainsworth@ed.ac.uk. Timothy M. JonesUniversity of
  11. cheri-jni-export

    https://www.cl.cam.ac.uk/research/security/ctsrd/pdfs/20170412-asplos-cherijni-slides.pdf
    18 Feb 2022: Moore, Peter G. Neumann, Ben Laurie,. Robert N. M. Watson. The Java abstract machine.

Refine your results

Format

Search history

Recently clicked results

Recently clicked results

Your click history is empty.

Recent searches

Recent searches

Your search history is empty.