Author:
Xia Hongyan,Woodruff Jonathan,Barral Hadrien,Esswood Lawrence,Joannou Alexandre,Kovacsics Robert,Chisnall David,Roe Michael,Davis Brooks,Napierala Edward,Baldwin John,Gudka Khilan,Neumann Peter G.,Richardson Alexander,Moore Simon W.,Watson Robert N. M.
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. CHERIoT: Complete Memory Safety for Embedded Devices;56th Annual IEEE/ACM International Symposium on Microarchitecture;2023-10-28
2. Software Compartmentalization Trade-Offs with Hardware Capabilities;Proceedings of the 12th Workshop on Programming Languages and Operating Systems;2023-10-23
3. CHERI-TrEE: Flexible enclaves on capability machines;2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P);2023-07
4. From MMU to MPU: Adaptation of the Pip Kernel to Constrained Devices;Artificial Intelligence, Soft Computing and Applications;2022-12-22
5. Proving full-system security properties under multiple attacker models on capability machines;2022 IEEE 35th Computer Security Foundations Symposium (CSF);2022-08