Computer Laboratory

CTSRD

CTSRD publications

Research conference and journal papers

  • Robert N. M. Watson, Jonathan Woodruff, Peter G. Neumann, Simon W. Moore, Jonathan Anderson, David Chisnall, Nirav Dave, Brooks Davis, Khilan Gudka, Ben Laurie, Steven J. Murdoch, Robert Norton, Michael Roe, Stacey Son, and Munraj Vadera. CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization, Proceedings of the 36th IEEE Symposium on Security and Privacy ("Oakland"), San Jose, California, USA, May 2015.
  • David Chisnall, Colin Rothwell, Brooks Davis, Robert N.M. Watson, Jonathan Woodruff, Simon W. Moore, Peter G. Neumann and Michael Roe. Beyond the PDP-11: Processor support for a memory-safe C abstract machine, Proceedings of Architectural Support for Programming Languages and Operating Systems (ASPLOS 2015), Istanbul, Turkey, March 2015.
  • Richard Uhler and Nirav Dave, Smten with Satisfiability-based Search, The ACM SIGPLAN conference on Systems, Programming, Languages and Applications: Software for Humanity (SPLASH 2014) Portland, OR, USA, October 20–24, 2014.
  • Ilias Marinos, Robert N. M. Watson, and Mark Handley, Network Stack Specialization for Performance, Proceedings of ACM SIGCOMM 2014 Conference (SIGCOMM'14), Chicago, IL, USA, August 17–22, 2014.
  • Jonathan Woodruff, Robert N. M. Watson, David Chisnall, Simon W. Moore, Jonathan Anderson, Brooks Davis, Ben Laurie, Peter G. Neumann, Robert Norton, and Michael Roe. The CHERI capability model: Revisiting RISC in an age of risk, Proceedings of the 41st International Symposium on Computer Architecture (ISCA 2014), Minneapolis, MN, USA, June 14–18, 2014.
  • Jonathan Anderson, Robert N. M. Watson, David Chisnall, Khilan Gudka, Brooks Davis, and Ilias Marinos. TESLA: Temporally Enhanced System Logic Assertions, Proceedings of The 2014 European Conference on Computer Systems (EuroSys 2014), Amsterdam, The Netherlands, April 14–16 2014.
  • Muralidaran Vijayaraghavan, Nirav Dave and Arvind, Modular Compilation of Guarded Atomic Actions, MemoCODE 2013, Portland, OR, USA, October 18–20, 2013.
  • Richard Uhler and Nirav Dave, Smten: Automatic Translation of High-level Symbolic Computations into SMT Queries, Computer-Aided Verification (CAV 2013), St. Petersburg, Russia, July 13–19, 2013.
  • William R. Harris, Somesh Jha, Thomas Reps, Jonathan Anderson, and Robert N. M. Watson, Declarative, Temporal, and Practical Programming with Capabilities, IEEE Symposium on Security and Privacy ("Oakland"), San Francisco, CA, USA, May 19–22, 2013.
  • Robert N.M. Watson, A Decade of OS Access-Control Extensibility: Open-source Security Foundations for mobile and embedded devices, Communications of the ACM, 56(2), February 2013, pages 52–63.
  • Peter G. Neumann, Inside Risks: More Sight on Foresight, Communications of the ACM, 56(2), February 2013, pages 23–25.
  • Peter G. Neumann, Inside Risks: The Foresight Saga, Redux, Communications of the ACM, 55(10), October 2012.
  • Myron King, Nirav Dave, and Arvind, Automatic Generation of Hardware/Software Interfaces, Architectural Support for Programming Languages and Operating Systems (ASPLOS 2012), London, UK, March 3–7 2012.

Research workshop papers

  • Ilias Marinos, Robert N. M. Watson, and Mark Handley. Network stack specialisation for performance. Twelfth ACM Workshop on Hot Topics in Networks (HotNets-XII), College Park, MD, USA, November 21–22, 2013.
  • Robert N. M. Watson, Steven J. Murdoch, Khilan Gudka, Jonathan Anderson, Peter G. Neumann, and Ben Laurie, Towards a theory of application compartmentalisation, Security Protocols Workshop, Cambridge, UK, March 18–20, 2013.
  • Jonathan Woodruff, Simon Moore and Robert Watson, Memory Segmentation to Support Secure Applications, CEUR Workshop: Doctoral Symposium on Engineering Secure Software and Systems (ESSoS), Paris, France, 26–27 February, 2013.
  • Khilan Gudka, Robert N. M. Watson, Steven Hand, Ben Laurie, and Anil Madhavapeddy, Exploring compartmentalisation hypotheses with SOAAP, Adaptive Host and Network Security (AHANS 2012), Lyons, France, September 10–14, 2012.
  • Robert N. M. Watson, Peter G. Neumann, Jonathan Woodruff, Jonathan Anderson, Ross Anderson, Nirav Dave, Ben Laurie, Simon W. Moore, Steven J. Murdoch, Philip Paeps, Michael Roe, and Hassen Saidi, CHERI: A Research Platform Deconflating Hardware Virtualization and Protection, RESoLVE workshop associated with ASPLOS in London, March 5–7, 2012.
  • Peter G. Neumann and Robert N. M. Watson, Capabilities Revisited: A Holistic Approach to Bottom-to-Top Assurance of Trustworthy Systems, Fourth Layered Assurance Workshop (in association with ACSAC 2010), Austin, Texas, USA, December 6–7, 2010.

Open-source and industrial papers

Presentations

  • Robert N. M. Watson, Jonathan Woodruff, Peter G. Neumann, Simon W. Moore, Jonathan Anderson, David Chisnall, Nirav Dave, Brooks Davis, Khilan Gudka, Ben Laurie, Steven J. Murdoch, Robert Norton, Michael Roe, Stacey Son, and Munraj Vadera. CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization, Proceedings of the 36th IEEE Symposium on Security and Privacy ("Oakland"), San Jose, California, USA, May 18 2015. (slides)
  • David Chisnall, Colin Rothwell, Brooks Davis, Robert N.M. Watson, Jonathan Woodruff, Simon W. Moore, Peter G. Neumann and Michael Roe. Beyond the PDP-11: Processor support for a memory-safe C abstract machine, Proceedings of Architectural Support for Programming Languages and Operating Systems (ASPLOS 2015), Istanbul, Turkey, March 5, 2015. (slides)
  • Jonathan Woodruff, Robert N. M. Watson, David Chisnall, Simon W. Moore, Jonathan Anderson, Brooks Davis, Ben Laurie, Peter G. Neumann, Robert Norton, and Michael Roe. The CHERI Capability Model - Revisiting RISC for an Age of Risk, Proceedings of the 41st International Symposium on Computer Architecture (ISCA 2014), Minneapolis, MN, USA, June 18, 2014. (video, PDF)
  • Robert N.M. Watson, Peter G. Neumann Jonathan Woodruff, Jonathan Anderson, Ross Anderson, Nirav Dave, Ben Laurie, Simon W. Moore, Steven J. Murdoch, Philip Paeps, Michael Roe, and Hassen Saidi. CHERI: a research platform deconflating hardware virtualization and protection. Workshop on Runtime Environments, Systems, Layering and Virtualized Environments (RESoLVE 2012), March 2, 2012. (slides)

Technical Reports - ISA specification and hardware/software references

Media

  • Peter G. Neumann, the San Jose Mercury News's Bruce Newman talks with Peter Neumann about cybersecurity. Link.
  • Robert N. M. Watson, IEEE Spectrum Techwise Conversation podcast interview, recorded 26 December 2012, explores the argument for clean-slate design and the nature of current attacker-defender asymmetry. Link.
  • Peter G. Neumann, Minnesota Public Radio's The Daily Circuit, 27 December 2012, discusses the inadequacy of passwords and the need for trustworthy systems. Link.
  • Peter G. Neumann. A profile of Peter Neumann, written by John Markoff, was included in The New York Times Science Tuesday section on 30 October 2012, along with a short video clip in the online version. Link.
  • Robert N. M. Watson, Queue Portrait: Robert Watson recorded in August 2012, explores research into the hardware-software interface. Link.
  • Peter G. Neumann, The New York Times has published a Special section on security with a quote from Peter G. Neumann in the lead article and an article on the CRASH program mentioning our work on CHERI.