Robert N. M. Watson

Orcid: 0000-0001-8139-8783

Affiliations:
  • University of Cambridge, UK


According to our database1, Robert N. M. Watson authored at least 57 papers between 2001 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Randomized Testing of RISC-V CPUs Using Direct Instruction Injection.
IEEE Des. Test, February, 2024

Formal Mechanised Semantics of CHERI C: Capabilities, Undefined Behaviour, and Provenance.
Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2024

Cornucopia Reloaded: Load Barriers for CHERI Heap Temporal Safety.
Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2024

2023
The Arm Morello Evaluation Platform - Validating CHERI-Based Security in a High-Performance System.
IEEE Micro, 2023

CHERIoT: Complete Memory Safety for Embedded Devices.
Proceedings of the 56th Annual IEEE/ACM International Symposium on Microarchitecture, 2023

Architectural Contracts for Safe Speculation.
Proceedings of the 41st IEEE International Conference on Computer Design, 2023

2022
CompartOS: CHERI Compartmentalization for Embedded Systems.
CoRR, 2022

Verified Security for the Morello Capability-enhanced Prototype Arm Architecture.
Proceedings of the Programming Languages and Systems, 2022

2020
Rigorous engineering for hardware security: Formal modelling and proof in the CHERI design and implementation process.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020


Position Paper: Defending Direct Memory Access with CHERI Capabilities.
Proceedings of the HASP@MICRO 2020: Hardware and Architectural Support for Security and Privacy, 2020

CHERI Macaroons: Efficient, host-based access control for cyber-physical systems.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

2019
CHERI Concentrate: Practical Compressed Capabilities.
IEEE Trans. Computers, 2019

Memory-Side Protection With a Capability Enforcement Co-Processor.
ACM Trans. Archit. Code Optim., 2019

Exploring C semantics and pointer provenance.
Proc. ACM Program. Lang., 2019

Rack-Scale Capabilities: Fine-Grained Protection for Large-Scale Memories.
Computer, 2019

Through computer architecture, darkly.
Commun. ACM, 2019

Thunderclap: Exploring Vulnerabilities in Operating System IOMMU Protection via DMA from Untrustworthy Peripherals.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

CHERIvoke: Characterising Pointer Revocation using CHERI Capabilities for Temporal Memory Safety.
Proceedings of the 52nd Annual IEEE/ACM International Symposium on Microarchitecture, 2019

CheriABI: Enforcing Valid Pointer Provenance and Minimizing Pointer Privilege in the POSIX C Run-time Environment.
Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, 2019

2018
Pointer Provenance in a Capability Architecture.
Proceedings of the 10th USENIX Workshop on the Theory and Practice of Provenance, 2018

Structural Analysis of Whole-System Provenance Graphs.
Proceedings of the Provenance and Annotation of Data and Processes, 2018


2017
Teaching Operating Systems with FreeBSD through Tracing, Analysis, and Experimentation.
login Usenix Mag., 2017

Applying Provenance in APT Monitoring and Analysis: Practical Challenges for Scalable, Efficient and Trustworthy Distributed Provenance.
Proceedings of the 9th USENIX Workshop on the Theory and Practice of Provenance, 2017

Disk|Crypt|Net: rethinking the stack for high-performance video streaming.
Proceedings of the Conference of the ACM Special Interest Group on Data Communication, 2017


Separating Translation from Protection in Address Spaces with Dynamic Remapping.
Proceedings of the 16th Workshop on Hot Topics in Operating Systems, 2017

CHERI JNI: Sinking the Java Security Model into the C.
Proceedings of the Twenty-Second International Conference on Architectural Support for Programming Languages and Operating Systems, 2017

2016
Fast Protection-Domain Crossing in the CHERI Capability-System Architecture.
IEEE Micro, 2016

CHERI: A Hardware-Software System to Support the Principle of Least Privilege.
ERCIM News, 2016

Into the depths of C: elaborating the de facto standards.
Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2016

Firmament: Fast, Centralized Cluster Scheduling at Scale.
Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation, 2016

2015
CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Queues Don't Matter When You Can JUMP Them!
Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation, 2015

Clean Application Compartmentalization with SOAAP.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Beyond the PDP-11: Architectural Support for a Memory-Safe C Abstract Machine.
Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, 2015

2014
Network stack specialization for performance.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

The CHERI capability model: Revisiting RISC in an age of risk.
Proceedings of the ACM/IEEE 41st International Symposium on Computer Architecture, 2014

TESLA: temporally enhanced system logic assertions.
Proceedings of the Ninth Eurosys Conference 2014, 2014

2013
A decade of OS access-control extensibility.
Commun. ACM, 2013

Towards a Theory of Application Compartmentalisation.
Proceedings of the Security Protocols XXI, 2013

Towards a Theory of Application Compartmentalisation (Transcript of Discussion).
Proceedings of the Security Protocols XXI, 2013

Declarative, Temporal, and Practical Programming with Capabilities.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

2012
A taste of Capsicum: practical capabilities for UNIX.
Commun. ACM, 2012

Stayin' Alive: Aliveness as an Alternative to Authentication.
Proceedings of the Security Protocols XX, 2012

Exploring Compartmentalisation Hypotheses with SOAAP.
Proceedings of the Sixth IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops, 2012

2011
New approaches to operating system security extensibility.
PhD thesis, 2011

How to Keep Bad Papers Out of Conferences (with Minimum Reviewer Effort).
Proceedings of the Security Protocols XIX, 2011

2010
Introducing Capsicum: Practical Capabilities for UNIX.
login Usenix Mag., 2010

The Age of Avatar Realism.
IEEE Robotics Autom. Mag., 2010

Capsicum: Practical Capabilities for UNIX.
Proceedings of the 19th USENIX Security Symposium, 2010

2008
Metrics for Security and Performance in Low-Latency Anonymity Systems.
Proceedings of the Privacy Enhancing Technologies, 2008

2007
Exploiting Concurrency Vulnerabilities in System Call Wrappers.
Proceedings of the First USENIX Workshop on Offensive Technologies, 2007

2006
Ignoring the Great Firewall of China.
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006

2002
Secure Active Network Prototypes.
Proceedings of the 2002 DARPA Active Networks Conference and Exposition (DANCE 2002), 2002

2001
TrustedBSD: Adding Trusted Operating System Features to FreeBSD.
Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference, 2001


  Loading...