The CHERI capability model: Revisiting RISC in an age of risk J Woodruff, RNM Watson, D Chisnall, SW Moore, J Anderson, B Davis, ... ACM SIGARCH Computer Architecture News 42 (3), 457-468, 2014 | 330 | 2014 |
CHERI: A hybrid capability-system architecture for scalable software compartmentalization RNM Watson, J Woodruff, PG Neumann, SW Moore, J Anderson, ... 2015 IEEE Symposium on Security and Privacy, 20-37, 2015 | 262 | 2015 |
Beyond the PDP-11: Architectural support for a memory-safe C abstract machine D Chisnall, C Rothwell, RNM Watson, J Woodruff, M Vadera, SW Moore, ... ACM SIGARCH Computer Architecture News 43 (1), 117-130, 2015 | 104 | 2015 |
Clean application compartmentalization with SOAAP K Gudka, RNM Watson, J Anderson, D Chisnall, B Davis, B Laurie, ... Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 81 | 2015 |
Capability hardware enhanced RISC instructions: CHERI instruction-set architecture (version 7) RNM Watson, PG Neumann, J Woodruff, M Roe, H Almatary, J Anderson, ... University of Cambridge, Computer Laboratory, 2019 | 74 | 2019 |
CheriABI: Enforcing valid pointer provenance and minimizing pointer privilege in the POSIX C run-time environment B Davis, RNM Watson, A Richardson, PG Neumann, SW Moore, ... Proceedings of the Twenty-Fourth International Conference on Architectural …, 2019 | 58 | 2019 |
Efficient tagged memory A Joannou, J Woodruff, R Kovacsics, SW Moore, A Bradbury, H Xia, ... 2017 IEEE International Conference on Computer Design (ICCD), 641-648, 2017 | 53 | 2017 |
Cheri concentrate: Practical compressed capabilities J Woodruff, A Joannou, H Xia, A Fox, RM Norton, D Chisnall, B Davis, ... IEEE Transactions on Computers 68 (10), 1455-1469, 2019 | 50 | 2019 |
Fast protection-domain crossing in the CHERI capability-system architecture RNM Watson, RM Norton, J Woodruff, SW Moore, PG Neumann, ... IEEE Micro 36 (5), 38-49, 2016 | 46 | 2016 |
Exploring C semantics and pointer provenance K Memarian, VBF Gomes, B Davis, S Kell, A Richardson, RNM Watson, ... Proceedings of the ACM on Programming Languages 3 (POPL), 1-32, 2019 | 43 | 2019 |
CHERI JNI: Sinking the Java security model into the C D Chisnall, B Davis, K Gudka, D Brazdil, A Joannou, J Woodruff, ... ACM SIGARCH Computer Architecture News 45 (1), 569-583, 2017 | 43 | 2017 |
Cornucopia: Temporal safety for CHERI heaps NW Filardo, BF Gutstein, J Woodruff, S Ainsworth, L Paul-Trifu, B Davis, ... 2020 IEEE Symposium on Security and Privacy (SP), 608-625, 2020 | 38 | 2020 |
Capability hardware enhanced RISC instructions: CHERI instruction-set architecture RNM Watson, PG Neumann, J Woodruff, M Roe, J Anderson, D Chisnall, ... University of Cambridge, Computer Laboratory, 2015 | 31 | 2015 |
CheriRTOS: A Capability Model for Embedded Devices H Xia, J Woodruff, H Barral, L Esswood, A Joannou, R Kovacsics, ... 2018 IEEE 36th International Conference on Computer Design (ICCD), 92-99, 2018 | 16 | 2018 |
Bluespec Extensible RISC Implementation: BERI Hardware reference RNM Watson, J Woodruff, D Chisnall, B Davis, W Koszek, AT Markettos, ... University of Cambridge, Computer Laboratory, 2015 | 14 | 2015 |
TESLA: temporally enhanced system logic assertions J Anderson, RNM Watson, D Chisnall, K Gudka, I Marinos, B Davis Proceedings of the Ninth European Conference on Computer Systems, 1-14, 2014 | 14 | 2014 |
CHERI C/C++ programming guide RNM Watson, A Richardson, B Davis, J Baldwin, D Chisnall, J Clarke, ... University of Cambridge, Computer Laboratory, 2020 | 13 | 2020 |
Capability Hardware Enhanced RISC Instructions: CHERI Programmer’s Guide RNM Watson, D Chisnall, B Davis, W Koszek, SW Moore, SJ Murdoch, ... University of Cambridge, Computer Laboratory, 2015 | 12 | 2015 |
Clean application compartmentalization with SOAAP (extended version) K Gudka, RNM Watson, J Anderson, D Chisnall, B Davis, B Laurie, ... University of Cambridge, Computer Laboratory, 2015 | 6 | 2015 |
Using topology-aware communication services in grid environments CA Lee, E Coe, BS Michel, J Stepanek, I Solis, JM Clark, B Davis CCGrid 2003. 3rd IEEE/ACM International Symposium on Cluster Computing and …, 2003 | 6 | 2003 |