Travelled to:
1 × China
1 × Hungary
Collaborated with:
S.Eisenbach T.Harris D.Cunningham D.Chisnall B.Davis Alexandre Joannou J.Woodruff A. Theodore Markettos J. Edward Maste Robert M. Norton Stacey D. Son M.Roe S.W.Moore P.G.Neumann Ben Laurie R.N.M.Watson David Brazdil Alexander Richardson John Baldwin James Clarke N.W.Filardo Alfredo Mazzinghi Edward Tomasz Napierala P.Sewell
Talks about:
pointer (2) cheri (2) lock (2) privileg (1) presenc (1) librari (1) environ (1) proven (1) enforc (1) valid (1)
Person: Khilan Gudka
DBLP: Gudka:Khilan
Contributed to:
Wrote 4 papers:
- ECOOP-2012-GudkaHE #library #scalability
- Lock Inference in the Presence of Large Libraries (KG, TH, SE), pp. 308–332.
- CC-2008-CunninghamGE
- Keep Off the Grass: Locking the Right Path for Atomicity (DC, KG, SE), pp. 276–290.
- ASPLOS-2017-ChisnallDGBJWMM #c #java #security
- CHERI JNI: Sinking the Java Security Model into the C (DC, BD, KG, DB, AJ, JW, ATM, JEM, RMN, SDS, MR, SWM, PGN, BL, RNMW), pp. 569–583.
- ASPLOS-2019-DavisWRNMBCCFGJ #c #named #pointer #runtime
- CheriABI: Enforcing Valid Pointer Provenance and Minimizing Pointer Privilege in the POSIX C Run-time Environment (BD, RNMW, AR, PGN, SWM, JB, DC, JC, NWF, KG, AJ, BL, ATM, JEM, AM, ETN, RMN, MR, PS, SDS, JW), pp. 379–393.