skip to content

Department of Computer Science and Technology

  • Research Staff

Publications

Journal articles

  • Memarian, K., Gomes, VBF., Davis, B., Kell, S., Richardson, A., Watson, RNM. and Sewell, P., 2019. Exploring C semantics and pointer provenance Proceedings of the ACM on Programming Languages, v. 3
    Doi: http://doi.org/10.1145/3290380
  • Azriel, L., Humbel, L., Achermann, R., Richardson, A., Hoffmann, M., Mendelson, A., Roscoe, T., Watson, RNM., Faraboschi, P. and Milojicic, D., 2019. Memory-Side Protection With a Capability Enforcement Co-Processor ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION, v. 16
    Doi: 10.1145/3302257
  • Conference proceedings

  • Achermann, R., Dalton, C., Faraboschi, P., Hoffmann, M., Milojicic, D., Ndu, G., Richardson, A., Roscoe, T., Shaw, AL. and Watson, RNM., 2017. Separating Translation from Protection in Address Spaces with Dynamic Remapping Proceedings of the Workshop on Hot Topics in Operating Systems - HOTOS, v. Part F129307
    Doi: 10.1145/3102980.3103000
  • Gudka, K., Watson, RNM., Anderson, J., Chisnall, D., Davis, B., Laurie, B., Marinos, I., Neumann, PG. and Richardson, A., 2015. Clean application compartmentalization with SOAAP Proceedings of the ACM Conference on Computer and Communications Security, v. 2015-October
    Doi: http://doi.org/10.1145/2810103.2813611
  • Filardo, N., Gutstein, BF., Woodruff, J., Ainsworth, S., Paul-Trifu, L., Davis, B., Xia, H., Napierala, ET., Richardson, A., Baldwin, J., Chisnall, D., Clarke, J., Gudka, K., Joannou, A., Markettos, AT., Mazzinghi, A., Norton, RM., Roe, M., Sewell, P., Son, S., Jones, TM., Moore, SW., Neumann, PG. and Watson, RNM., Cornucopia: Temporal Safety for CHERI Heaps Proceedings of the 41st IEEE Symposium on Security and Privacy,
  • Dodson, M., Beresford, AR., Watson, R., Clarke, J. and Richardson, A., CHERI Macaroons: Efficient, host-based access control for cyber-physical systems
  • Woodruff, JD., Joannou, A., Kovacsics, R., Moore, SW., Bradbury, A., Xia, H., Robert, RNM., Chisnall, D., Roe, M., Davis, B., Napierala, E., Baldwin, J., Gudka, K., Neumann, PG., Mazzinghi, A., Richardson, A., Son, S. and Markettos, AT., Efficient Tagged Memory IEEE International Conference on Computer Design - VLSI in Computers and Processors,
  • Xia, H., Woodruff, J., Barral, H., Esswood, L., Joannou, A., Kovacsics, R., Chisnall, D., Roe, M., Davis, B., Napierala, E., Baldwin, J., Gudka, K., Neumann, PG., Richardson, A., Moore, S. and Watson, R., CheriRTOS: A Capability Model for Embedded Devices
  • David, B., Watson, R., Alexander, R., Peter, N., Moore, S., Baldwin, J., Chisnall, D., Clarke, J., Filardo, N., Gudka, K., Joannou, A., Laurie, B., Markettos, A., Maste, J., Mazzinghi, A., Napierala, E., Norton, R., Roe, M., Sewell, P., Son, S. and Woodruff, J., CheriABI: Enforcing Valid Pointer Provenance and Minimizing Pointer Privilege in the POSIX C Run-time Environment ACM,
  • Xia, H., Woodruff, J., Ainsworth, S., Filardo, N., Roe, M., Richardson, A., Rugg, P., Neumann, P., Moore, S., Watson, R. and Jones, T., CHERIvoke: Characterising Pointer Revocation using CHERI Capabilities for Temporal Memory Safety
  • Datasets

  • Xia, H., Woodruff, J., Ainsworth, S., Filardo, N., Roe, M., Richardson, A., Rugg, P., Neumann, P., Moore, S., Watson, R. and Jones, T., Research data supporting "CHERIvoke: Characterising Pointer Revocation using CHERI Capabilities for Temporal Memory Safety"
  • Filardo, N., Gutstein, B., Woodruff, J., Ainsworth, S., Paul-Trifu, L., Davis, B., Xia, H., Napierala, E., Richardson, A., Baldwin, J., Chisnall, D., Clarke, J., Gudka, K., Joannou, A., Markettos, AT., Mazzinghi, A., Norton, RM., Roe, M., Sewell, P., Son, S., Jones, TM., Moore, SW., Neumann, PG. and Watson, RNM., Research data supporting 'Cornucopia: Temporal Safety for CHERI Heaps'
  • Theses / dissertations

  • Richardson, A., Complete spatial safety for C and C++ using CHERI capabilities
  • Contact Details

    Room: 
    GE15
    Office phone: 
    (01223) 7-63512
    Email: 

    alr48@cam.ac.uk