Follow
Jonathan Anderson
Title
Cited by
Cited by
Year
The CHERI capability model: Revisiting RISC in an age of risk
J Woodruff, RNM Watson, D Chisnall, SW Moore, J Anderson, B Davis, ...
ACM SIGARCH Computer Architecture News 42 (3), 457-468, 2014
3122014
Prying data out of a social network
J Bonneau, J Anderson, G Danezis
2009 International Conference on Advances in Social Network Analysis and†…, 2009
2742009
CHERI: A hybrid capability-system architecture for scalable software compartmentalization
RNM Watson, J Woodruff, PG Neumann, SW Moore, J Anderson, ...
Security and Privacy (SP), 2015 IEEE Symposium on, 20-37, 2015
2622015
Capsicum: practical capabilities for UNIX
RNM Watson, J Anderson, B Laurie, K Kennaway
USENIX Security Symposium, 2010
2342010
Eight friends are enough: social graph approximation via public listings
J Bonneau, J Anderson, R Anderson, F Stajano
Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, 13-18, 2009
1702009
Privacy suites: Shared privacy for social networks
J Bonneau, J Anderson, L Church
Symposium on Usable Privacy and Security (SOUPS), 2009
1592009
Privacy-enabling social networking over untrusted networks
J Anderson, C Diaz, J Bonneau, F Stajano
Workshop on Online Social Networks (WOSN), 1-6, 2009
1212009
Clean Application Compartmentalization with SOAAP
K Gudka, RNM Watson, J Anderson, D Chisnall, B Davis, B Laurie, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications†…, 2015
812015
Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 5)
RNM Watson, PG Neumann, J Woodruff, M Roe, J Anderson, D Chisnall, ...
University of Cambridge, Computer Laboratory, 2016
742016
Privacy stories: Confidence in privacy behaviors through end user programming
L Church, J Anderson, J Bonneau, F Stajano
Symposium on Usable Privacy and Security (SOUPS), 2009
622009
Fast Protection-Domain Crossing in the CHERI Capability-System Architecture
RNM Watson, RM Norton, J Woodruff, SW Moore, PG Neumann, ...
IEEE Micro 36 (5), 38-49, 2016
462016
Inglorious installers: security in the application marketplace
J Anderson, J Bonneau, F Stajano
Workshop on the Economics of Information Security (WEIS), 2010
392010
A taste of Capsicum: practical capabilities for UNIX
RNM Watson, J Anderson, B Laurie, K Kennaway
Communications of the ACM 55 (3), 97-104, 2012
322012
CHERI: a research platform deconflating hardware virtualization and protection
RNM Watson, PG Neumann, J Woodruff, J Anderson, R Anderson, ...
Runtime Environments, Systems, Layering and Virtualized Environments†…, 2012
322012
Capability hardware enhanced RISC instructions: CHERI instruction-set architecture
RNM Watson, PG Neumann, J Woodruff, M Roe, J Anderson, D Chisnall, ...
University of Cambridge, Computer Laboratory, 2015
312015
Security Protocols XXII
B Christianson, J Malcolm, V MatyŠš, P Švenda, F Stajano, J Anderson
Springer, 2014
22*2014
Security Protocols XXI: 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers
J Anderson, J Bonneau, J Malcolm, F Stajano, B Christianson
Springer Berlin Heidelberg, 2013
22*2013
Security Protocols XVII
B Christianson, JA Malcolm, V Matyas, M Roe
Springer Berlin, Heidelberg, 2009
22*2009
Must social networking conflict with privacy?
J Anderson, F Stajano
IEEE security & privacy 11 (3), 51-60, 2013
202013
TESLA: temporally enhanced system logic assertions
J Anderson, RNM Watson, D Chisnall, K Gudka, I Marinos, B Davis
Proceedings of the Ninth European Conference on Computer Systems, 1-14, 2014
142014
The system can't perform the operation now. Try again later.
Articles 1–20