Collaborated with:
D.Chisnall B.Davis K.Gudka Alexandre Joannou J.Woodruff A. Theodore Markettos Robert M. Norton Stacey D. Son M.Roe S.W.Moore P.G.Neumann Ben Laurie R.N.M.Watson David Brazdil Alexander Richardson John Baldwin James Clarke N.W.Filardo Alfredo Mazzinghi Edward Tomasz Napierala P.Sewell
Talks about:
pointer (2) cheri (2) privileg (1) environ (1) proven (1) enforc (1) valid (1) secur (1) posix (1) model (1)
Person: J. Edward Maste
DBLP: Maste:J=_Edward
Contributed to:
Wrote 2 papers:
- ASPLOS-2017-ChisnallDGBJWMM #c #java #security
- CHERI JNI: Sinking the Java Security Model into the C (DC, BD, KG, DB, AJ, JW, ATM, JEM, RMN, SDS, MR, SWM, PGN, BL, RNMW), pp. 569–583.
- ASPLOS-2019-DavisWRNMBCCFGJ #c #named #pointer #runtime
- CheriABI: Enforcing Valid Pointer Provenance and Minimizing Pointer Privilege in the POSIX C Run-time Environment (BD, RNMW, AR, PGN, SWM, JB, DC, JC, NWF, KG, AJ, BL, ATM, JEM, AM, ETN, RMN, MR, PS, SDS, JW), pp. 379–393.