Computer Laboratory

Security Group

Peer-Reviewed Publications

The CHERI capability model: Revisiting RISC in an age of risk
Jonathan Woodruff, Robert N. M. Watson, David Chisnall, Simon W. Moore, Jonathan Anderson, Brooks Davis, Ben Laurie, Peter G. Neumann, Robert Norton and Michael Roe
TESLA: Temporally Enhanced Security Logic Assertions
Jonathan Anderson, Robert N M Watson, David Chisnall, Khilan Gudka and Brooks Davis
To appear at EuroSys 2014 , April 2014.
Must social networking conflict with privacy?
Jonathan Anderson and Frank Stajano
In IEEE Security & Privacy 11(3) , May–June 2013.
Declarative, Temporal, and Practical Programming with Capabilities
William R. Harris, Somesh Jha, Thomas Reps, Jonathan Anderson and Robert N. M. Watson
Towards a Theory of Application Compartmentalisation
Robert N. M. Watson, Steven J. Murdoch, Khilan Gudka, Jonathan Anderson, Peter G. Neumann and Ben Laurie
A taste of Capsicum: practical capabilities for UNIX
Robert Watson, Jonathan Anderson, Ben Laurie and Kris Kennaway
In Communications of the ACM 55(3), pp. 97–104, 2012.
Capsicum: practical capabilities for UNIX
Robert Watson, Jonathan Anderson, Ben Laurie and Kris Kennaway
Presented at the 19th USENIX Security Symposium, 2010.
On Storing Public Keys in the Cloud
Jonathan Anderson and Frank Stajano
To appear in Proceedings of the Eighteenth International Workshop on Security Protocols, 2010.
Privacy Enabling Social Networking Over Untrusted Networks
Jonathan Anderson, Claudia Diaz, Joseph Bonneau and Frank Stajano
Not That Kind of Friend: Misleading Divergences Between Online Social Networks and Real-World Social Protocols
Jonathan Anderson and Frank Stajano
To appear in Proceedings of the Seventeenth International Workshop on Security Protocols, 2009.

Workshops

CHERI: a research platform deconflating hardware virtualization and protection
Robert N.M. Watson, Peter G. Neumann, Jonathan Woodruff, Jonathan Anderson, Ross Anderson, Nirav Dave, Ben Laurie, Simon W. Moore, Steven J. Murdoch, Philip Paeps, Michael Roe and Hassen Saidi
Security APIs for Online Applications
Jonathan Anderson, Joseph Bonneau and Frank Stajano

Posters

Privacy Stories: Confidence in Privacy Behaviors through End User Programming [Poster]
Luke Church, Jonathan Anderson, Joseph Bonneau and Frank Stajano
Poster presented at the Fifth Symposium on Usable Privacy and Security, 2009.
Privacy Suites: Shared Privacy for Social Networks [Poster]
Joseph Bonneau, Jonathan Anderson and Luke Church
Poster presented at the Fifth Symposium on Usable Privacy and Security, 2009.

Press Releases, etc.

Attack of the Zombie Photos
Joseph Bonneau, Jonathan Anderson, Andrew Lewis and Frank Stajano
Published on Light Blue Touchpaper, May 2009.
Press release: Facebook consultation as much of a sham as their democracy
Joseph Bonneau, Jonathan Anderson, Richard Clayton, Ross Anderson and Frank Stajano
Published on Light Blue Touchpaper, April 2009.
Democracy Theatre: Comments on Facebook's Proposed Governance Scheme
Joseph Bonneau, Soren Prebusch, Jonathan Anderson, Richard Clayton and Ross Anderson
Published on Light Blue Touchpaper, March 2009.
Think of the Children
Joseph Bonneau and Jonathan Anderson
Published on Light Blue Touchpaper, December 2008.