BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter

Collaborated with:
P.Sewell D.Chisnall B.Davis K.Gudka Alexandre Joannou J.Woodruff A. Theodore Markettos J. Edward Maste Stacey D. Son M.Roe S.W.Moore P.G.Neumann Ben Laurie R.N.M.Watson A.Armstrong Thomas Bauereiss Brian Campbell 0001 A.Reid K.E.Gray Prashanth Mundkur Mark Wassell Jon French Christopher Pulte S.Flur I.Stark Neel Krishnaswami David Brazdil Alexander Richardson John Baldwin James Clarke N.W.Filardo Alfredo Mazzinghi Edward Tomasz Napierala
Talks about:
cheri (3) pointer (2) privileg (1) environ (1) semant (1) proven (1) enforc (1) valid (1) secur (1) posix (1)

Person: Robert M. Norton

DBLP DBLP: Norton:Robert_M=

Contributed to:

POPL 20192019
ASPLOS 20172017
ASPLOS 20192019

Wrote 3 papers:

POPL-2019-ArmstrongBCRGNM #semantics
ISA semantics for ARMv8-a, RISC-v, and CHERI-MIPS (AA, TB, BC0, AR, KEG, RMN, PM, MW, JF, CP, SF, IS, NK, PS), p. 31.
ASPLOS-2017-ChisnallDGBJWMM #c #java #security
CHERI JNI: Sinking the Java Security Model into the C (DC, BD, KG, DB, AJ, JW, ATM, JEM, RMN, SDS, MR, SWM, PGN, BL, RNMW), pp. 569–583.
ASPLOS-2019-DavisWRNMBCCFGJ #c #named #pointer #runtime
CheriABI: Enforcing Valid Pointer Provenance and Minimizing Pointer Privilege in the POSIX C Run-time Environment (BD, RNMW, AR, PGN, SWM, JB, DC, JC, NWF, KG, AJ, BL, ATM, JEM, AM, ETN, RMN, MR, PS, SDS, JW), pp. 379–393.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.