Khilan Gudka
TitleCited byYear
Cheri: A hybrid capability-system architecture for scalable software compartmentalization
RNM Watson, J Woodruff, PG Neumann, SW Moore, J Anderson, ...
2015 IEEE Symposium on Security and Privacy, 20-37, 2015
Clean application compartmentalization with SOAAP
K Gudka, RNM Watson, J Anderson, D Chisnall, B Davis, B Laurie, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Keep off the grass: Locking the right path for atomicity
D Cunningham, K Gudka, S Eisenbach
International Conference on Compiler Construction, 276-290, 2008
Lock inference in the presence of large libraries
K Gudka, T Harris, S Eisenbach
European Conference on Object-Oriented Programming, 308-332, 2012
Fast protection-domain crossing in the cheri capability-system architecture
RNM Watson, RM Norton, J Woodruff, SW Moore, PG Neumann, ...
IEEE Micro 36 (5), 38-49, 2016
Efficient tagged memory
A Joannou, J Woodruff, R Kovacsics, SW Moore, A Bradbury, H Xia, ...
2017 IEEE International Conference on Computer Design (ICCD), 641-648, 2017
Exploring compartmentalisation hypotheses with SOAAP
K Gudka, RNM Watson, S Hand, B Laurie, A Madhavapeddy
2012 IEEE Sixth International Conference on Self-Adaptive and Self …, 2012
CHERI JNI: Sinking the Java security model into the C
D Chisnall, B Davis, K Gudka, D Brazdil, A Joannou, J Woodruff, ...
ACM SIGOPS Operating Systems Review 51 (2), 569-583, 2017
TESLA: temporally enhanced system logic assertions.
J Anderson, RNM Watson, D Chisnall, K Gudka, I Marinos, B Davis
EuroSys, 19:1-19:14, 2014
Clean application compartmentalization with SOAAP (extended version)
K Gudka, RNM Watson, J Anderson, D Chisnall, B Davis, B Laurie, ...
University of Cambridge, Computer Laboratory, 2015
CheriABI: Enforcing Valid Pointer Provenance and Minimizing Pointer Privilege in the POSIX C Run-time Environment
B Davis, RNM Watson, A Richardson, PG Neumann, SW Moore, ...
University of Cambridge, Computer Laboratory, 2019
Lock Inference for Java
K Gudka
Imperial College London, 2013
Implementing atomic sections using lock inference
K Gudka
CheriRTOS: A Capability Model for Embedded Devices
H Xia, J Woodruff, H Barral, L Esswood, A Joannou, R Kovacsics, ...
2018 IEEE 36th International Conference on Computer Design (ICCD), 92-99, 2018
Fast multi-level locks for java
K Gudka, S Eisenbach
Position paper presented at the Workshop on Exploiting Concurrency …, 2012
Towards a theory of application compartmentalisation
RNM Watson, SJ Murdoch, K Gudka, J Anderson, PG Neumann, B Laurie
Cambridge International Workshop on Security Protocols, 19-27, 2013
Improving the performance of Atomic Sections Transfer Report
K Gudka
Atomicity for Concurrent Programs Outsourcing Report
K Gudka
Implementing Atomic Sections Using Lock Inference Final Report
K Gudka
Total Recall Final Report
P Collingbourne, N Durve, K Gudka, S Lovegrove, J Ma, S Shahrbaf
The system can't perform the operation now. Try again later.
Articles 1–20