Computer Laboratory


CTSRD publications

Research conference and journal papers

Research workshop papers

  • Ilias Marinos, Robert N. M. Watson, and Mark Handley. Network stack specialisation for performance. Twelfth ACM Workshop on Hot Topics in Networks (HotNets-XII), College Park, MD, USA, November 21–22, 2013.
  • Robert N. M. Watson, Steven J. Murdoch, Khilan Gudka, Jonathan Anderson, Peter G. Neumann, and Ben Laurie, Towards a theory of application compartmentalisation, Security Protocols Workshop, Cambridge, UK, March 18–20, 2013.
  • Jonathan Woodruff, Simon Moore and Robert Watson, Memory Segmentation to Support Secure Applications, CEUR Workshop: Doctoral Symposium on Engineering Secure Software and Systems (ESSoS), Paris, France, 26–27 February, 2013.
  • Khilan Gudka, Robert N. M. Watson, Steven Hand, Ben Laurie, and Anil Madhavapeddy, Exploring compartmentalisation hypotheses with SOAAP, Adaptive Host and Network Security (AHANS 2012), Lyons, France, September 10–14, 2012.
  • Robert N. M. Watson, Peter G. Neumann, Jonathan Woodruff, Jonathan Anderson, Ross Anderson, Nirav Dave, Ben Laurie, Simon W. Moore, Steven J. Murdoch, Philip Paeps, Michael Roe, and Hassen Saidi, CHERI: A Research Platform Deconflating Hardware Virtualization and Protection, RESoLVE workshop associated with ASPLOS in London, March 5–7, 2012.
  • Peter G. Neumann and Robert N. M. Watson, Capabilities Revisited: A Holistic Approach to Bottom-to-Top Assurance of Trustworthy Systems, Fourth Layered Assurance Workshop (in association with ACSAC 2010), Austin, Texas, USA, December 6–7, 2010.

Open-source and industrial papers


  • Jonathan Woodruff, Robert N. M. Watson, David Chisnall, Simon W. Moore, Jonathan Anderson, Brooks Davis, Ben Laurie, Peter G. Neumann, Robert Norton, and Michael Roe. The CHERI Capability Model - Revisiting RISC for an Age of Risk, Proceedings of the 41st International Symposium on Computer Architecture (ISCA 2014), Minneapolis, MN, USA, June 18, 2014. (video, PDF)
  • Robert N.M. Watson, Peter G. Neumann Jonathan Woodruff, Jonathan Anderson, Ross Anderson, Nirav Dave, Ben Laurie, Simon W. Moore, Steven J. Murdoch, Philip Paeps, Michael Roe, and Hassen Saidi. CHERI: a research platform deconflating hardware virtualization and protection. Workshop on Runtime Environments, Systems, Layering and Virtualized Environments (RESoLVE 2012), March 2, 2012. (slides)

Technical Reports - ISA specification and hardwre/software references


  • Peter G. Neumann, the San Jose Mercury News's Bruce Newman talks with Peter Neumann about cybersecurity. Link.
  • Robert N. M. Watson, IEEE Spectrum Techwise Conversation podcast interview, recorded 26 December 2012, explores the argument for clean-slate design and the nature of current attacker-defender asymmetry. Link.
  • Peter G. Neumann, Minnesota Public Radio's The Daily Circuit, 27 December 2012, discusses the inadequacy of passwords and the need for trustworthy systems. Link.
  • Peter G. Neumann. A profile of Peter Neumann, written by John Markoff, was included in The New York Times Science Tuesday section on 30 October 2012, along with a short video clip in the online version. Link.
  • Robert N. M. Watson, Queue Portrait: Robert Watson recorded in August 2012, explores research into the hardware-software interface. Link.