Journal articles
Memarian, K., Gomes, VBF., Davis, B., Kell, S., Richardson, A., Watson, RNM. and Sewell, P., 2019. Exploring C semantics and pointer provenance Proceedings of the ACM on Programming Languages, v. 3
Doi: http://doi.org/10.1145/3290380
Azriel, L., Humbel, L., Achermann, R., Richardson, A., Hoffmann, M., Mendelson, A., Roscoe, T., Watson, RNM., Faraboschi, P. and Milojicic, D., 2019. Memory-Side Protection With a Capability Enforcement Co-Processor ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION, v. 16
Doi: 10.1145/3302257
Conference proceedings
Achermann, R., Dalton, C., Faraboschi, P., Hoffmann, M., Milojicic, D., Ndu, G., Richardson, A., Roscoe, T., Shaw, AL. and Watson, RNM., 2017. Separating Translation from Protection in Address Spaces with Dynamic Remapping Proceedings of the Workshop on Hot Topics in Operating Systems - HOTOS, v. Part F129307
Doi: 10.1145/3102980.3103000
Gudka, K., Watson, RNM., Anderson, J., Chisnall, D., Davis, B., Laurie, B., Marinos, I., Neumann, PG. and Richardson, A., 2015. Clean application compartmentalization with SOAAP Proceedings of the ACM Conference on Computer and Communications Security, v. 2015-October
Doi: http://doi.org/10.1145/2810103.2813611
Dodson, M., Beresford, AR., Watson, R., Clarke, J. and Richardson, A., CHERI Macaroons: Efficient, host-based access control for cyber-physical systems
Woodruff, JD., Joannou, A., Kovacsics, R., Moore, SW., Bradbury, A., Xia, H., Robert, RNM., Chisnall, D., Roe, M., Davis, B., Napierala, E., Baldwin, J., Gudka, K., Neumann, PG., Mazzinghi, A., Richardson, A., Son, S. and Markettos, AT., Efficient Tagged Memory IEEE International Conference on Computer Design - VLSI in Computers and Processors,
Xia, H., Woodruff, J., Barral, H., Esswood, L., Joannou, A., Kovacsics, R., Chisnall, D., Roe, M., Davis, B., Napierala, E., Baldwin, J., Gudka, K., Neumann, PG., Richardson, A., Moore, S. and Watson, R., CheriRTOS: A Capability Model for Embedded Devices
David, B., Watson, R., Alexander, R., Peter, N., Moore, S., Baldwin, J., Chisnall, D., Clarke, J., Filardo, N., Gudka, K., Joannou, A., Laurie, B., Markettos, A., Maste, J., Mazzinghi, A., Napierala, E., Norton, R., Roe, M., Sewell, P., Son, S. and Woodruff, J., CheriABI: Enforcing Valid Pointer Provenance and Minimizing Pointer Privilege in the POSIX C Run-time Environment ACM,
Xia, H., Woodruff, J., Ainsworth, S., Filardo, N., Roe, M., Richardson, A., Rugg, P., Neumann, P., Moore, S., Watson, R. and Jones, T., CHERIvoke: Characterising Pointer Revocation using CHERI Capabilities for Temporal Memory Safety
Filardo, N., Gutstein, BF., Woodruff, J., Ainsworth, S., Paul-Trifu, L., Davis, B., Xia, H., Napierala, ET., Richardson, A., Baldwin, J., Chisnall, D., Clarke, J., Gudka, K., Joannou, A., Markettos, AT., Mazzinghi, A., Norton, RM., Roe, M., Sewell, P., Son, S., Jones, TM., Moore, SW., Neumann, PG. and Watson, RNM., Cornucopia: Temporal Safety for CHERI Heaps Proceedings of the 41st IEEE Symposium on Security and Privacy,
Datasets
Filardo, N., Gutstein, B., Woodruff, J., Ainsworth, S., Paul-Trifu, L., Davis, B., Xia, H., Napierala, E., Richardson, A., Baldwin, J., Chisnall, D., Clarke, J., Gudka, K., Joannou, A., Markettos, AT., Mazzinghi, A., Norton, RM., Roe, M., Sewell, P., Son, S., Jones, TM., Moore, SW., Neumann, PG. and Watson, RNM., Research data supporting 'Cornucopia: Temporal Safety for CHERI Heaps'
Xia, H., Woodruff, J., Ainsworth, S., Filardo, N., Roe, M., Richardson, A., Rugg, P., Neumann, P., Moore, S., Watson, R. and Jones, T., Research data supporting "CHERIvoke: Characterising Pointer Revocation using CHERI Capabilities for Temporal Memory Safety"
Theses / dissertations
Richardson, A., Complete spatial safety for C and C++ using CHERI capabilities