Robert N. M. Watson
Robert N. M. Watson
University Senior Lecturer, Computer Laboratory, University of Cambridge
Verified email at cl.cam.ac.uk - Homepage
Title
Cited by
Year
Developing a Test Suite for Transient-Execution Attacks on RISC-V and CHERI-RISC-V
FA Fuchs, J Woodruff, SW Moore, PG Neumann, RNM Watson
2021
Verified security for the Morello capability-enhanced prototype Arm architecture
T Bauereiss, B Campbell, T Sewell, A Armstrong, L Esswood, I Stark, ...
University of Cambridge, Computer Laboratory, 2021
2021
CHERI Macaroons: Efficient, host-based access control for cyber-physical systems
M Dodson, AR Beresford, R Watson, J Clarke, A Richardson
12020
CHERI C/C++ Programming Guide
RNM Watson, A Richardson, B Davis, J Baldwin, D Chisnall, J Clarke, ...
42020
Cornucopia: Temporal safety for CHERI heaps
N Wesley Filardo, BF Gutstein, J Woodruff, S Ainsworth, L Paul-Trifu, ...
2020
Cornucopia: Temporal Safety for CHERI Heaps
NW Filardo, BF Gutstein, J Woodruff, S Ainsworth, L Paul-Trifu, B Davis, ...
2020 IEEE Symposium on Security and Privacy (SP). Los Alamitos, CA, USA …, 2020
172020
Research data supporting'Cornucopia: Temporal Safety for CHERI Heaps'
N Filardo, B Gutstein, J Woodruff, S Ainsworth, L Paul-Trifu, B Davis, H Xia, ...
2020
DSbD CHERI and Morello Capability Essential IP (Version 1)
RNM Watson, J Woodruff, A Joannou, SW Moore, P Sewell
University of Cambridge, Computer Laboratory, 2020
2020
CHERI C/C++ Programming Guide
RNM Watson, A Richardson, B Davis, J Baldwin, D Chisnall, J Clarke, ...
University of Cambridge, Computer Laboratory, 2020
42020
CRASH-worthy Trustworthy Systems R&D (CTSRD): CHERI System Architecture and Research
PG Neumann, RNM Watson, SW Moore
2019
CHERIvoke: Characterising Pointer Revocation using CHERI Capabilities for Temporal Memory Safety
H Xia, J Woodruff, S Ainsworth, NW Filardo, M Roe, A Richardson, ...
Proceedings of the 52nd Annual IEEE/ACM International Symposium on …, 2019
242019
CHERI Concentrate: Practical Compressed Capabilities
J Woodruff, A Joannou, H Xia, A Fox, RM Norton, D Chisnall, B Davis, ...
IEEE Annals of the History of Computing, 1455-1469, 2019
292019
Casual, Adaptive, Distributed, and Efficient Tracing System (CADETS)
A Strnad, Q Messiter, R Watson, L Carata, J Anderson, B Kidney
BAE Systems Burlington United States, 2019
22019
Research data supporting" CHERIvoke: Characterising Pointer Revocation using CHERI Capabilities for Temporal Memory Safety"
H Xia, J Woodruff, S Ainsworth, N Filardo, M Roe, A Richardson, P Rugg, ...
2019
Through computer architecture, darkly
AT Markettos, RNM Watson, SW Moore, P Sewell, PG Neumann
Communications of the ACM 62 (6), 25-27, 2019
32019
Cheri concentrate: Practical compressed capabilities
J Woodruff, A Joannou, H Xia, A Fox, RM Norton, D Chisnall, B Davis, ...
IEEE Transactions on Computers 68 (10), 1455-1469, 2019
292019
CheriABI: Enforcing valid pointer provenance and minimizing pointer privilege in the POSIX C run-time environment
B Davis, RNM Watson, A Richardson, PG Neumann, SW Moore, ...
Proceedings of the Twenty-Fourth International Conference on Architectural …, 2019
312019
Rack-Scale Capabilities: Fine-Grained Protection for Large-Scale Memories
KM Bresniker, P Faraboschi, A Mendelson, D Milojicic, T Roscoe, ...
Computer 52 (2), 52-62, 2019
22019
Memory-side protection with a capability enforcement co-processor
L Azriel, L Humbel, R Achermann, A Richardson, M Hoffmann, ...
ACM Transactions on Architecture and Code Optimization (TACO) 16 (1), 1-26, 2019
42019
Thunderclap: Exploring Vulnerabilities in Operating System IOMMU Protection via DMA from Untrustworthy Peripherals.
AT Markettos, C Rothwell, BF Gutstein, A Pearce, PG Neumann, ...
NDSS, 2019
462019
The system can't perform the operation now. Try again later.
Articles 1–20