Computer Laboratory

CTSRD

CTSRD publications

Academic papers and articles

  • Ilias Marinos, Robert N. M. Watson, and Mark Handley, Network Stack Specialization for Performance, Proceedings of ACM SIGCOMM 2014 Conference (SIGCOMM'14), Chicago, IL, USA, August 17–22, 2014. Forthcoming publication.
  • Jonathan Woodruff, Robert N. M. Watson, David Chisnall, Simon W. Moore, Jonathan Anderson, Brooks Davis, Ben Laurie, Peter G. Neumann, Robert Norton, and Michael Roe. The CHERI capability model: Revisiting RISC in an age of risk, Proceedings of the 41st International Symposium on Computer Architecture (ISCA 2014), Minneapolis, MN, USA, June 14–18, 2014.
  • Jonathan Anderson, Robert N. M. Watson, David Chisnall, Khilan Gudka, Brooks Davis, and Ilias Marinos. TESLA: Temporally Enhanced System Logic Assertions, Proceedings of The 2014 European Conference on Computer Systems (EuroSys 2014), Amsterdam, The Netherlands, April 14–16 2014.
  • Brooks Davis, Robert Norton, Jonathan Woodruff, and Robert N. M. Watson. How FreeBSD Boots: a soft-core MIPS perspective, Proceedings of AsiaBSDCon 2014, Tokyo, Japan, March 13–16 2014.
  • David Chisnall. LLVM in the FreeBSD Toolchain, Proceedings of AsiaBSDCon 2014, Tokyo, Japan, March 13–16, 2014.
  • Ilias Marinos, Robert N. M. Watson, and Mark Handley. Network stack specialisation for performance. Twelfth ACM Workshop on Hot Topics in Networks (HotNets-XII), College Park, MD, USA, November 21–22, 2013.
  • A Theodore Markettos, Jonathan Woodruff, Robert N. M. Watson, Bjoern A. Zeeb, Brooks Davis, Simon W Moore, The BERIpad tablet: open-source construction, CPU, OS and applications, Proceedings of 2013 FPGA Workshop and Design Contest, Southeast University, Nanjing, China, November 1–3, 2013.
  • Muralidaran Vijayaraghavan, Nirav Dave and Arvind, Modular Compilation of Guarded Atomic Actions, MemoCODE 2013, Portland, OR, USA, October 18–20, 2013.
  • Richard Uhler and Nirav Dave, Smten: Automatic Translation of High-level Symbolic Computations into SMT Queries, Computer-Aided Verification (CAV 2013), St. Petersburg, Russia, July 13–19, 2013.
  • William R. Harris, Somesh Jha, Thomas Reps, Jonathan Anderson, and Robert N. M. Watson, Declarative, Temporal, and Practical Programming with Capabilities, IEEE Symposium on Security and Privacy ("Oakland"), San Francisco, CA, USA, May 19–22, 2013.
  • Robert N. M. Watson, Steven J. Murdoch, Khilan Gudka, Jonathan Anderson, Peter G. Neumann, and Ben Laurie, Towards a theory of application compartmentalisation, Security Protocols Workshop, Cambridge, UK, March 18–20, 2013.
  • Robert N.M. Watson, A Decade of OS Access-Control Extensibility: Open-source Security Foundations for mobile and embedded devices, Communications of the ACM, 56(2), February 2013, pages 52–63.
  • Jonathan Woodruff, Simon Moore and Robert Watson, Memory Segmentation to Support Secure Applications, CEUR Workshop: Doctoral Symposium on Engineering Secure Software and Systems (ESSoS), Paris, France, 26–27 February, 2013.
  • Peter G. Neumann, Inside Risks: More Sight on Foresight, Communications of the ACM, 56(2), February 2013, pages 23–25.
  • Peter G. Neumann, Inside Risks: The Foresight Saga, Redux, Communications of the ACM, 55(10), October 2012.
  • Khilan Gudka, Robert N. M. Watson, Steven Hand, Ben Laurie, and Anil Madhavapeddy, Exploring compartmentalisation hypotheses with SOAAP, Adaptive Host and Network Security (AHANS 2012), Lyons, France, September 10–14, 2012.
  • Myron King, Nirav Dave, and Arvind, Automatic Generation of Hardware/Software Interfaces, Architectural Support for Programming Languages and Operating Systems (ASPLOS 2012), London, UK, March 3–7 2012.
  • Robert N. M. Watson, Peter G. Neumann, Jonathan Woodruff, Jonathan Anderson, Ross Anderson, Nirav Dave, Ben Laurie, Simon W. Moore, Steven J. Murdoch, Philip Paeps, Michael Roe, and Hassen Saidi, CHERI: A Research Platform Deconflating Hardware Virtualization and Protection, RESoLVE workshop associated with ASPLOS in London, March 5–7, 2012.
  • Peter G. Neumann and Robert N. M. Watson, Capabilities Revisited: A Holistic Approach to Bottom-to-Top Assurance of Trustworthy Systems, Fourth Layered Assurance Workshop (in association with ACSAC 2010), Austin, Texas, USA, December 6–7, 2010.

Presentations

  • Jonathan Woodruff, Robert N. M. Watson, David Chisnall, Simon W. Moore, Jonathan Anderson, Brooks Davis, Ben Laurie, Peter G. Neumann, Robert Norton, and Michael Roe. The CHERI Capability Model - Revisiting RISC for an Age of Risk, Proceedings of the 41st International Symposium on Computer Architecture (ISCA 2014), Minneapolis, MN, USA, June 18, 2014. (video, PDF)
  • Robert N.M. Watson, Peter G. Neumann Jonathan Woodruff, Jonathan Anderson, Ross Anderson, Nirav Dave, Ben Laurie, Simon W. Moore, Steven J. Murdoch, Philip Paeps, Michael Roe, and Hassen Saidi. CHERI: a research platform deconflating hardware virtualization and protection. Workshop on Runtime Environments, Systems, Layering and Virtualized Environments (RESoLVE 2012), March 2, 2012. (slides)

Technical Reports

Media

  • Peter G. Neumann, the San Jose Mercury News's Bruce Newman talks with Peter Neumann about cybersecurity. Link.
  • Robert N. M. Watson, IEEE Spectrum Techwise Conversation podcast interview, recorded 26 December 2012, explores the argument for clean-slate design and the nature of current attacker-defender asymmetry. Link.
  • Peter G. Neumann, Minnesota Public Radio's The Daily Circuit, 27 December 2012, discusses the inadequacy of passwords and the need for trustworthy systems. Link.
  • Peter G. Neumann. A profile of Peter Neumann, written by John Markoff, was included in The New York Times Science Tuesday section on 30 October 2012, along with a short video clip in the online version. Link.
  • Robert N. M. Watson, Queue Portrait: Robert Watson recorded in August 2012, explores research into the hardware-software interface. Link.