Robert N. M. Watson
Robert N. M. Watson
University Senior Lecturer, Computer Laboratory, University of Cambridge
Verified email at cl.cam.ac.uk - Homepage
Title
Cited by
Cited by
Year
Jails: Confining the omnipotent root
PH Kamp, RNM Watson
Proceedings of the 2nd International SANE Conference, 2000
5012000
The Design and Implementation of the FreeBSD Operating System, Second Edition
MK McKusick, GV Neville-Neil, RNM Watson
Pearson Education, 2014
359*2014
The Design and Implementation of the FreeBSD Operating System
MK McKusick, GV Neville-Neil, RNM Watson
359*
Ignoring the great firewall of china
R Clayton, SJ Murdoch, RNM Watson
ISJLP 3, 273, 2007
3242007
Ignoring the great firewall of China
R Clayton, S Murdoch, RNM Watson
Privacy Enhancing Technologies, 20-35, 2006
3002006
The CHERI capability model: Revisiting RISC in an age of risk
J Woodruff, RNM Watson, D Chisnall, SW Moore, J Anderson, B Davis, ...
245*
Capsicum: practical capabilities for UNIX
RNM Watson, J Anderson, B Laurie, K Kennaway
USENIX Security, 2010
2132010
Queues don’t matter when you can JUMP them!
MP Grosvenor, M Schwarzkopf, I Gog, RNM Watson, AW Moore, S Hand, ...
12th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2015
2032015
CHERI: A hybrid capability-system architecture for scalable software compartmentalization
RNM Watson, J Woodruff, PG Neumann, SW Moore, J Anderson, ...
IEEE Symposium on Security and Privacy, 2015
1892015
Firmament: fast, centralized cluster scheduling at scale
I Gog, M Schwarzkopf, A Gleave, RNM Watson, S Hand
Proceedings of OSDI’16: 12th USENIX Symposium on Operating Systems Design …, 2016
1832016
Network stack specialization for performance
I Marinos, RNM Watson, M Handley
Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, 9, 2013
1702013
System and method for transacting a validated application session in a networked computing environment
RNM Watson, O Gudmundsson, D Kindred
US Patent 6,779,033, 2004
1252004
Exploiting concurrency vulnerabilities in system call wrappers
RNM Watson
Proceedings of the first USENIX workshop on Offensive Technologies, 2, 2007
1192007
Applying Provenance in APT Monitoring and Analysis
G Jenkinson, L Carata, N Balakrishnan, T Bytheway, R Sohan, ...
ACM Special Interest Group on Programming Languages, 2017
104*2017
Into the depths of C: elaborating the de facto standards
K Memarian, J Matthiesen, J Lingard, K Nienhuis, D Chisnall, ...
Proceedings of the 37th ACM SIGPLAN Conference on Programming Language …, 2016
1042016
System and method for preventing a spoofed remote procedure call denial of service attack in a networked computing environment
RNM Watson, O Gudmundsson
US Patent 6,775,704, 2004
1042004
Strong security for active networks
S Murphy, E Lewis, R Puga, R Watson, R Yee
Open Architectures and Network Programming Proceedings, 2001 IEEE, 63-70, 2001
932001
Metrics for security and performance in low-latency anonymity systems
SJ Murdoch, RNM Watson
International Symposium on Privacy Enhancing Technologies Symposium, 115-132, 2008
922008
Beyond the PDP-11: Architectural support for a memory-safe C abstract machine
D Chisnall, C Rothwell, RNM Watson, J Woodruff, M Vadera, SW Moore, ...
Proceedings of the Twentieth International Conference on Architectural …, 2015
912015
The TrustedBSD MAC framework: Extensible kernel access control for FreeBSD 5.0
R Watson, W Morrison, C Vance, B Feldman
Proc. 2003 USENIX Annual Technical Conference, 285-296, 2003
862003
The system can't perform the operation now. Try again later.
Articles 1–20