Collaborated with:
D.Chisnall B.Davis K.Gudka Alexandre Joannou J.Woodruff J. Edward Maste Robert M. Norton Stacey D. Son M.Roe S.W.Moore P.G.Neumann Ben Laurie R.N.M.Watson David Brazdil Alexander Richardson John Baldwin James Clarke N.W.Filardo Alfredo Mazzinghi Edward Tomasz Napierala P.Sewell
Talks about:
pointer (2) cheri (2) privileg (1) environ (1) proven (1) enforc (1) valid (1) secur (1) posix (1) model (1)
Person: A. Theodore Markettos
DBLP: Markettos:A=_Theodore
Contributed to:
Wrote 2 papers:
- ASPLOS-2017-ChisnallDGBJWMM #c #java #security
- CHERI JNI: Sinking the Java Security Model into the C (DC, BD, KG, DB, AJ, JW, ATM, JEM, RMN, SDS, MR, SWM, PGN, BL, RNMW), pp. 569–583.
- ASPLOS-2019-DavisWRNMBCCFGJ #c #named #pointer #runtime
- CheriABI: Enforcing Valid Pointer Provenance and Minimizing Pointer Privilege in the POSIX C Run-time Environment (BD, RNMW, AR, PGN, SWM, JB, DC, JC, NWF, KG, AJ, BL, ATM, JEM, AM, ETN, RMN, MR, PS, SDS, JW), pp. 379–393.