Collaborated with:
P.Sewell D.Chisnall B.Davis K.Gudka Alexandre Joannou J.Woodruff A. Theodore Markettos J. Edward Maste Stacey D. Son M.Roe S.W.Moore P.G.Neumann Ben Laurie R.N.M.Watson A.Armstrong Thomas Bauereiss Brian Campbell 0001 A.Reid K.E.Gray Prashanth Mundkur Mark Wassell Jon French Christopher Pulte S.Flur I.Stark Neel Krishnaswami David Brazdil Alexander Richardson John Baldwin James Clarke N.W.Filardo Alfredo Mazzinghi Edward Tomasz Napierala
Talks about:
cheri (3) pointer (2) privileg (1) environ (1) semant (1) proven (1) enforc (1) valid (1) secur (1) posix (1)
Person: Robert M. Norton
DBLP: Norton:Robert_M=
Contributed to:
Wrote 3 papers:
- POPL-2019-ArmstrongBCRGNM #semantics
- ISA semantics for ARMv8-a, RISC-v, and CHERI-MIPS (AA, TB, BC0, AR, KEG, RMN, PM, MW, JF, CP, SF, IS, NK, PS), p. 31.
- ASPLOS-2017-ChisnallDGBJWMM #c #java #security
- CHERI JNI: Sinking the Java Security Model into the C (DC, BD, KG, DB, AJ, JW, ATM, JEM, RMN, SDS, MR, SWM, PGN, BL, RNMW), pp. 569–583.
- ASPLOS-2019-DavisWRNMBCCFGJ #c #named #pointer #runtime
- CheriABI: Enforcing Valid Pointer Provenance and Minimizing Pointer Privilege in the POSIX C Run-time Environment (BD, RNMW, AR, PGN, SWM, JB, DC, JC, NWF, KG, AJ, BL, ATM, JEM, AM, ETN, RMN, MR, PS, SDS, JW), pp. 379–393.