Search
Search Funnelback University
- Refined by:
- Date: 2022
21 -
30 of
94
search results for `Peter Watson`
Fully-matching results
-
Position Paper:Defending Direct Memory Access with CHERI Capabilities
https://www.cl.cam.ac.uk/research/security/ctsrd/pdfs/2020hasp-cheri-dma.pdf18 Feb 2022: Theodore Markettos, John Baldwin, Ruslan Bukin, Peter G. Neumann,Simon W. Moore, and Robert N. ... HASP’20, October 2020, Online A. Theodore Markettos, John Baldwin, Ruslan Bukin, Peter G. -
CHERIvoke: Characterising Pointer Revocation using CHERI Capabilities …
https://www.cl.cam.ac.uk/research/security/ctsrd/pdfs/201910micro-cheri-temporal-safety.pdf18 Feb 2022: Peter RuggUniversity of Cambridge. Peter G. NeumannSRI International. Simon W. MooreUniversity of Cambridge. ... Filardo,Michael Roe, Alexander Richardson, Peter Rugg, Peter G. Neumann, SimonW. Moore, Robert N. -
20160423-cheri-microkernel-workshop
https://www.cl.cam.ac.uk/research/security/ctsrd/cheri/workshops/pdfs/20160423-cheri-microkernel-workshop.pdf18 Feb 2022: Moore. University of Cambridge. Peter G. NeumannSRI International. CHERI Microkernel Workshop – 23 April 2016. ... CHERI models Simon Moore. CHERI C compiler David Chisnall. CheriBSD OS model Robert Watson. -
Developing a Test Suite for Transient-Execution Attacks on RISC-V and …
https://www.cl.cam.ac.uk/research/security/ctsrd/pdfs/202106-carrv-transient-execution.pdf18 Feb 2022: M. Watson, Alexander Richardson, Peter G. Neumann,Simon W. Moore, John Baldwin, David Chisnall, Jessica Clarke, Nathaniel WesleyFilardo, Khilan Gudka, Alexandre Joannou, Ben Laurie, A. ... RISC-V Foundation. Volume II: Privileged Architecture. [19] -
20190414-cheriabi
https://www.cl.cam.ac.uk/research/security/ctsrd/pdfs/20190414-cheriabi.pdf18 Feb 2022: CheriABIEnforcing/Valid/Pointer/Provenance/and/Minimizing/Pointer/Privilege/in/the/POSIX/C/Run?time/Environment. ... David/Chisnall,. James/Clarke,/Nathaniel/Wesley/Filardo,/Khilan -
Computer Science & Technology Advanced Topics inComputer…
https://www.cl.cam.ac.uk/teaching/2223/R265/slides/cheri.pdf3 Nov 2022: Run-time Environment. Brooks Davisbrooks.davis@sri.com. Robert N. M. Watson†robert.watson@cl.cam.ac.uk. Alexander Richardson†alexander.richardson@cl.cam.ac.uk. Peter G. ... Alfredo Mazzinghi†am2419@cam.ac.uk. Edward Tomasz -
Exploring C Semantics and Pointer Provenance
https://www.cl.cam.ac.uk/research/security/ctsrd/pdfs/201901-popl-cerberus.pdf18 Feb 2022: F. Gomes, Brooks Davis, Stephen Kell, Alexander Richardson, Robert N. M.Watson, and Peter Sewell. ... 67:12 Memarian, Gomes, Davis, Kell, Richardson, Watson, Sewell. usually involving one or more linking steps. -
Memory safety with CHERI capabilities: security analysis, language…
https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-975.pdf7 Nov 2022: To all members of theCHERI project, and especially Alex Richardson, Jessica Clarke, Peter Neumann, and JohnBaldwin, for making this work possible. ... Reports. • Peter G. Neumann and Brett F. Gutstein. CHERI’s mitigation of security vulnera-bilities. -
MineSweeper: A ``Clean Sweep'' for Drop-In Use-after-Free…
https://www.cl.cam.ac.uk/~tmj32/papers/docs/erdos22-asplos.pdf1 Oct 2022: MineSweeper: A “Clean Sweep” for Drop-In Use-after-FreePrevention. Márton ErdősUniversity of Cambridge. Cambridge, UKme412@cam.ac.uk. Sam AinsworthUniversity of Edinburgh. Edinburgh, UKsam.ainsworth@ed.ac.uk. Timothy M. JonesUniversity of -
cheri-jni-export
https://www.cl.cam.ac.uk/research/security/ctsrd/pdfs/20170412-asplos-cherijni-slides.pdf18 Feb 2022: Moore, Peter G. Neumann, Ben Laurie,. Robert N. M. Watson. The Java abstract machine.
Search history
Recently clicked results
Recently clicked results
Your click history is empty.
Recent searches
Recent searches
Your search history is empty.