Volgen
Robert N. M. Watson
Robert N. M. Watson
Department of Computer Science and Technology, University of Cambridge
Geverifieerd e-mailadres voor cl.cam.ac.uk - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Jails: Confining the omnipotent root
PH Kamp, RNM Watson
Proceedings of the 2nd International SANE Conference, 2000
5292000
The CHERI capability model: Revisiting RISC in an age of risk
J Woodruff, RNM Watson, D Chisnall, SW Moore, J Anderson, B Davis, ...
436*
Ignoring the great firewall of china
R Clayton, SJ Murdoch, RNM Watson
ISJLP 3, 273, 2007
3962007
CHERI: A hybrid capability-system architecture for scalable software compartmentalization
RNM Watson, J Woodruff, PG Neumann, SW Moore, J Anderson, ...
IEEE Symposium on Security and Privacy, 2015
3942015
The Design and Implementation of the FreeBSD Operating System, Second Edition
MK McKusick, GV Neville-Neil, RNM Watson
Pearson Education, 2014
393*2014
Ignoring the great firewall of China
R Clayton, S Murdoch, RNM Watson
Privacy Enhancing Technologies, 20-35, 2006
3712006
Firmament: fast, centralized cluster scheduling at scale
I Gog, M Schwarzkopf, A Gleave, RNM Watson, S Hand
Proceedings of OSDI’16: 12th USENIX Symposium on Operating Systems Design …, 2016
2992016
Queues don’t matter when you can JUMP them!
MP Grosvenor, M Schwarzkopf, I Gog, RNM Watson, AW Moore, S Hand, ...
12th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2015
2792015
Capsicum: practical capabilities for UNIX
RNM Watson, J Anderson, B Laurie, K Kennaway
USENIX Security, 2010
2722010
Network stack specialization for performance
I Marinos, RNM Watson, M Handley
Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, 9, 2013
2432013
Applying Provenance in APT Monitoring and Analysis
G Jenkinson, L Carata, N Balakrishnan, T Bytheway, R Sohan, ...
ACM Special Interest Group on Programming Languages, 2017
203*2017
Into the depths of C: elaborating the de facto standards
K Memarian, J Matthiesen, J Lingard, K Nienhuis, D Chisnall, ...
Proceedings of the 37th ACM SIGPLAN Conference on Programming Language …, 2016
1432016
Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 5)
RNM Watson, PG Neumann, J Woodruff, M Roe, J Anderson, D Chisnall, ...
University of Cambridge, Computer Laboratory, 2016
1392016
Exploiting concurrency vulnerabilities in system call wrappers
RNM Watson
Proceedings of the first USENIX workshop on Offensive Technologies, 2, 2007
1282007
System and method for transacting a validated application session in a networked computing environment
RNM Watson, O Gudmundsson, D Kindred
US Patent 6,779,033, 2004
1272004
Beyond the PDP-11: Architectural support for a memory-safe C abstract machine
D Chisnall, C Rothwell, RNM Watson, J Woodruff, M Vadera, SW Moore, ...
Proceedings of the Twentieth International Conference on Architectural …, 2015
1172015
Design and implementation of the TrustedBSD MAC Framework
R Watson, B Feldman, A Migus, C Vance
DARPA Information Survivability Conference and Exposition, 2003. Proceedings …, 2003
115*2003
Clean Application Compartmentalization with SOAAP
K Gudka, RNM Watson, J Anderson, D Chisnall, B Davis, B Laurie, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1092015
System and method for preventing a spoofed remote procedure call denial of service attack in a networked computing environment
RNM Watson, O Gudmundsson
US Patent 6,775,704, 2004
1092004
Thunderclap: Exploring Vulnerabilities in Operating System IOMMU Protection via DMA from Untrustworthy Peripherals.
AT Markettos, C Rothwell, BF Gutstein, A Pearce, PG Neumann, ...
NDSS, 2019
1072019
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20