BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Travelled to:
1 × China
1 × Hungary
Collaborated with:
S.Eisenbach T.Harris D.Cunningham D.Chisnall B.Davis Alexandre Joannou J.Woodruff A. Theodore Markettos J. Edward Maste Robert M. Norton Stacey D. Son M.Roe S.W.Moore P.G.Neumann Ben Laurie R.N.M.Watson David Brazdil Alexander Richardson John Baldwin James Clarke N.W.Filardo Alfredo Mazzinghi Edward Tomasz Napierala P.Sewell
Talks about:
pointer (2) cheri (2) lock (2) privileg (1) presenc (1) librari (1) environ (1) proven (1) enforc (1) valid (1)

Person: Khilan Gudka

DBLP DBLP: Gudka:Khilan

Contributed to:

ECOOP 20122012
CC 20082008
ASPLOS 20172017
ASPLOS 20192019

Wrote 4 papers:

ECOOP-2012-GudkaHE #library #scalability
Lock Inference in the Presence of Large Libraries (KG, TH, SE), pp. 308–332.
CC-2008-CunninghamGE
Keep Off the Grass: Locking the Right Path for Atomicity (DC, KG, SE), pp. 276–290.
ASPLOS-2017-ChisnallDGBJWMM #c #java #security
CHERI JNI: Sinking the Java Security Model into the C (DC, BD, KG, DB, AJ, JW, ATM, JEM, RMN, SDS, MR, SWM, PGN, BL, RNMW), pp. 569–583.
ASPLOS-2019-DavisWRNMBCCFGJ #c #named #pointer #runtime
CheriABI: Enforcing Valid Pointer Provenance and Minimizing Pointer Privilege in the POSIX C Run-time Environment (BD, RNMW, AR, PGN, SWM, JB, DC, JC, NWF, KG, AJ, BL, ATM, JEM, AM, ETN, RMN, MR, PS, SDS, JW), pp. 379–393.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.