Alexander Richardson
Alexander Richardson
Google, University of Cambridge
Verified email at
Cited by
Cited by
A practical guide to environmental flows for policy and planning
E Kendy, C Apse, K Blann, MP Smith, A Richardson
Nat Conserv, 2012
Clean application compartmentalization with SOAAP
K Gudka, RNM Watson, J Anderson, D Chisnall, B Davis, B Laurie, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 7)
RNM Watson, PG Neumann, J Woodruff, M Roe, H Almatary, J Anderson, ..., 2019
CheriABI: Enforcing valid pointer provenance and minimizing pointer privilege in the POSIX C run-time environment
B Davis, RNM Watson, A Richardson, PG Neumann, SW Moore, ...
Proceedings of the Twenty-Fourth International Conference on Architectural …, 2019
Efficient tagged memory
A Joannou, J Woodruff, R Kovacsics, SW Moore, A Bradbury, H Xia, ...
2017 IEEE International Conference on Computer Design (ICCD), 641-648, 2017
Cherivoke: Characterising pointer revocation using cheri capabilities for temporal memory safety
H Xia, J Woodruff, S Ainsworth, NW Filardo, M Roe, A Richardson, ...
Proceedings of the 52nd Annual IEEE/ACM International Symposium on …, 2019
Exploring C semantics and pointer provenance
K Memarian, VBF Gomes, B Davis, S Kell, A Richardson, RNM Watson, ...
Proceedings of the ACM on Programming Languages 3 (POPL), 1-32, 2019
Cornucopia: Temporal safety for CHERI heaps
NW Filardo, BF Gutstein, J Woodruff, S Ainsworth, L Paul-Trifu, B Davis, ...
2020 IEEE Symposium on Security and Privacy (SP), 608-625, 2020
Separating translation from protection in address spaces with dynamic remapping
R Achermann, C Dalton, P Faraboschi, M Hoffmann, D Milojicic, G Ndu, ...
Proceedings of the 16th Workshop on Hot Topics in Operating Systems, 118-124, 2017
CheriRTOS: A Capability Model for Embedded Devices
H Xia, J Woodruff, H Barral, L Esswood, A Joannou, R Kovacsics, ...
2018 IEEE 36th International Conference on Computer Design (ICCD), 92-99, 2018
CHERI C/C++ programming guide
RNM Watson, A Richardson, B Davis, J Baldwin, D Chisnall, J Clarke, ...
University of Cambridge, Computer Laboratory, 2020
Complete spatial safety for C and C++ using CHERI capabilities
A Richardson
University of Cambridge, Computer Laboratory, 2020
Clean application compartmentalization with SOAAP (extended version)
K Gudka, RNM Watson, J Anderson, D Chisnall, B Davis, B Laurie, ...
University of Cambridge, Computer Laboratory, 2015
Assessing the Viability of an Open-Source CHERI Desktop Software Ecosystem
RNM Watson, B Laurie, A Richardson …, 2021
Memory-side protection with a capability enforcement co-processor
L Azriel, L Humbel, R Achermann, A Richardson, M Hoffmann, ...
ACM Transactions on Architecture and Code Optimization (TACO) 16 (1), 1-26, 2019
Capability based locking and access of shared persistent memory
AL Richardson, MJ Hoffmann, DS Milojicic
US Patent 10,628,057, 2020
CHERI Macaroons: Efficient, host-based access control for cyber-physical systems
M Dodson, AR Beresford, A Richardson, J Clarke, RNM Watson
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2020
Matching pointers across levels of a memory hierarchy
DS Milojicic, MJ Hoffmann, A Richardson
US Patent 10,303,615, 2019
Semantic Tagging of CAN and Dash Camera Data from Naturalistic Drives
K Sanborn, A Richardson, J Sprinkle
2022 ACM/IEEE 13th International Conference on Cyber-Physical Systems (ICCPS …, 2022
Intelligent Structuring and Semantic Mapping of Dash Camera Footage and CAN Bus Data
A Richardson, K Sanborn, J Sprinkle
2022 2nd Workshop on Data-Driven and Intelligent Cyber-Physical Systems for …, 2022
The system can't perform the operation now. Try again later.
Articles 1–20