Collaborated with:
D.Chisnall B.Davis K.Gudka Alexandre Joannou J.Woodruff A. Theodore Markettos J. Edward Maste Robert M. Norton Stacey D. Son M.Roe S.W.Moore P.G.Neumann R.N.M.Watson David Brazdil Alexander Richardson John Baldwin James Clarke N.W.Filardo Alfredo Mazzinghi Edward Tomasz Napierala P.Sewell
Talks about:
pointer (2) cheri (2) privileg (1) environ (1) proven (1) enforc (1) valid (1) secur (1) posix (1) model (1)
Person: Ben Laurie
DBLP: Laurie:Ben
Contributed to:
Wrote 2 papers:
- ASPLOS-2017-ChisnallDGBJWMM #c #java #security
- CHERI JNI: Sinking the Java Security Model into the C (DC, BD, KG, DB, AJ, JW, ATM, JEM, RMN, SDS, MR, SWM, PGN, BL, RNMW), pp. 569–583.
- ASPLOS-2019-DavisWRNMBCCFGJ #c #named #pointer #runtime
- CheriABI: Enforcing Valid Pointer Provenance and Minimizing Pointer Privilege in the POSIX C Run-time Environment (BD, RNMW, AR, PGN, SWM, JB, DC, JC, NWF, KG, AJ, BL, ATM, JEM, AM, ETN, RMN, MR, PS, SDS, JW), pp. 379–393.