Jonathan Anderson
Title
Cited by
Cited by
Year
Prying data out of a social network
J Bonneau, J Anderson, G Danezis
2009 International Conference on Advances in Social Network Analysis and …, 2009
2582009
The CHERI capability model: Revisiting RISC in an age of risk
J Woodruff, RNM Watson, D Chisnall, SW Moore, J Anderson, B Davis, ...
ACM SIGARCH Computer Architecture News 42 (3), 457-468, 2014
2002014
Capsicum: practical capabilities for UNIX
RNM Watson, J Anderson, B Laurie, K Kennaway
USENIX Security Symposium, 2010
1922010
Privacy suites: Shared privacy for social networks
J Bonneau, J Anderson, L Church
Symposium on Usable Privacy and Security (SOUPS), 2009
1692009
CHERI: A hybrid capability-system architecture for scalable software compartmentalization
RNM Watson, J Woodruff, PG Neumann, SW Moore, J Anderson, ...
Security and Privacy (SP), 2015 IEEE Symposium on, 20-37, 2015
1572015
Eight friends are enough: social graph approximation via public listings
J Bonneau, J Anderson, R Anderson, F Stajano
Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, 13-18, 2009
1532009
Privacy-enabling social networking over untrusted networks
J Anderson, C Diaz, J Bonneau, F Stajano
Workshop on Online Social Networks (WOSN), 1-6, 2009
1192009
Privacy stories: Confidence in privacy behaviors through end user programming
L Church, J Anderson, J Bonneau, F Stajano
Symposium on Usable Privacy and Security (SOUPS), 2009
722009
Clean Application Compartmentalization with SOAAP
K Gudka, RNM Watson, J Anderson, D Chisnall, B Davis, B Laurie, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
462015
Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 5)
RNM Watson, PG Neumann, J Woodruff, M Roe, J Anderson, D Chisnall, ...
University of Cambridge, Computer Laboratory, 2016
362016
Inglorious installers: security in the application marketplace
J Anderson, J Bonneau, F Stajano
Workshop on the Economics of Information Security (WEIS), 2010
342010
Fast Protection-Domain Crossing in the CHERI Capability-System Architecture
RNM Watson, RM Norton, J Woodruff, SW Moore, PG Neumann, ...
IEEE Micro 36 (5), 38-49, 2016
272016
CHERI: a research platform deconflating hardware virtualization and protection
RNM Watson, PG Neumann, J Woodruff, J Anderson, R Anderson, ...
Runtime Environments, Systems, Layering and Virtualized Environments …, 2012
272012
A taste of Capsicum: practical capabilities for UNIX
RNM Watson, J Anderson, B Laurie, K Kennaway
Communications of the ACM 55 (3), 97-104, 2012
242012
Capability hardware enhanced RISC instructions: CHERI instruction-set architecture
RNM Watson, PG Neumann, J Woodruff, M Roe, J Anderson, D Chisnall, ...
University of Cambridge, Computer Laboratory, 2015
192015
Must social networking conflict with privacy?
J Anderson, F Stajano
IEEE security & privacy 11 (3), 51-60, 2013
162013
Declarative, temporal, and practical programming with capabilities
WR Harris, S Jha, T Reps, J Anderson, RNM Watson
2013 IEEE Symposium on Security and Privacy, 18-32, 2013
132013
TESLA: temporally enhanced system logic assertions
J Anderson, RNM Watson, D Chisnall, K Gudka, I Marinos, B Davis
Proceedings of the Ninth European Conference on Computer Systems, 1-14, 2014
112014
Not That Kind of Friend: Misleading Divergences Between Online Social Networks and Real-World Social Protocols
J Anderson, F Stajano
International Workshop on Security Protocols, 1-6, 2009
102009
Clean application compartmentalization with SOAAP (extended version)
K Gudka, RNM Watson, J Anderson, D Chisnall, B Davis, B Laurie, ...
University of Cambridge, Computer Laboratory, 2015
62015
The system can't perform the operation now. Try again later.
Articles 1–20