Robert N. M. Watson
Orcid: 0000-0001-8139-8783Affiliations:
- University of Cambridge, UK
According to our database1,
Robert N. M. Watson
authored at least 58 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
IEEE Des. Test, February, 2024
Formal Mechanised Semantics of CHERI C: Capabilities, Undefined Behaviour, and Provenance.
Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2024
Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2024
2023
The Arm Morello Evaluation Platform - Validating CHERI-Based Security in a High-Performance System.
IEEE Micro, 2023
Proceedings of the 56th Annual IEEE/ACM International Symposium on Microarchitecture, 2023
Proceedings of the 41st IEEE International Conference on Computer Design, 2023
2022
Proceedings of the Programming Languages and Systems, 2022
2020
Rigorous engineering for hardware security: Formal modelling and proof in the CHERI design and implementation process.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the HASP@MICRO 2020: Hardware and Architectural Support for Security and Privacy, 2020
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
2019
ACM Trans. Archit. Code Optim., 2019
Computer, 2019
Thunderclap: Exploring Vulnerabilities in Operating System IOMMU Protection via DMA from Untrustworthy Peripherals.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
CHERIvoke: Characterising Pointer Revocation using CHERI Capabilities for Temporal Memory Safety.
Proceedings of the 52nd Annual IEEE/ACM International Symposium on Microarchitecture, 2019
CheriABI: Enforcing Valid Pointer Provenance and Minimizing Pointer Privilege in the POSIX C Run-time Environment.
Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, 2019
2018
Proceedings of the 10th USENIX Workshop on the Theory and Practice of Provenance, 2018
Proceedings of the Provenance and Annotation of Data and Processes, 2018
Proceedings of the 36th IEEE International Conference on Computer Design, 2018
2017
Teaching Operating Systems with FreeBSD through Tracing, Analysis, and Experimentation.
login Usenix Mag., 2017
Applying Provenance in APT Monitoring and Analysis: Practical Challenges for Scalable, Efficient and Trustworthy Distributed Provenance.
Proceedings of the 9th USENIX Workshop on the Theory and Practice of Provenance, 2017
Proceedings of the Conference of the ACM Special Interest Group on Data Communication, 2017
Proceedings of the 2017 IEEE International Conference on Computer Design, 2017
Proceedings of the 16th Workshop on Hot Topics in Operating Systems, 2017
Proceedings of the Twenty-Second International Conference on Architectural Support for Programming Languages and Operating Systems, 2017
2016
IEEE Micro, 2016
ERCIM News, 2016
Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2016
Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation, 2016
2015
CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, 2015
2014
Proceedings of the ACM/IEEE 41st International Symposium on Computer Architecture, 2014
Proceedings of the Ninth Eurosys Conference 2014, 2014
2013
Proceedings of the Security Protocols XXI, 2013
Proceedings of the Security Protocols XXI, 2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, 2013
2012
Proceedings of the Security Protocols XX, 2012
Proceedings of the Sixth IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops, 2012
2011
Proceedings of the Security Protocols XIX, 2011
2010
Proceedings of the 19th USENIX Security Symposium, 2010
2008
Proceedings of the Privacy Enhancing Technologies, 2008
2007
Proceedings of the First USENIX Workshop on Offensive Technologies, 2007
2006
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006
2002
Proceedings of the 2002 DARPA Active Networks Conference and Exposition (DANCE 2002), 2002
2001
Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference, 2001