Khilan Gudka
Khilan Gudka
Verifierad e-postadress på - Startsida
Citeras av
Citeras av
Cheri: A hybrid capability-system architecture for scalable software compartmentalization
RNM Watson, J Woodruff, PG Neumann, SW Moore, J Anderson, ...
2015 IEEE Symposium on Security and Privacy, 20-37, 2015
Clean application compartmentalization with soaap
K Gudka, RNM Watson, J Anderson, D Chisnall, B Davis, B Laurie, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Efficient tagged memory
A Joannou, J Woodruff, R Kovacsics, SW Moore, A Bradbury, H Xia, ...
2017 IEEE International Conference on Computer Design (ICCD), 641-648, 2017
Fast protection-domain crossing in the CHERI capability-system architecture
RNM Watson, RM Norton, J Woodruff, SW Moore, PG Neumann, ...
IEEE Micro 36 (5), 38-49, 2016
CheriABI: Enforcing valid pointer provenance and minimizing pointer privilege in the POSIX C run-time environment
B Davis, RNM Watson, A Richardson, PG Neumann, SW Moore, ...
Proceedings of the Twenty-Fourth International Conference on Architectural …, 2019
Keep off the grass: Locking the right path for atomicity
D Cunningham, K Gudka, S Eisenbach
International Conference on Compiler Construction, 276-290, 2008
CHERI JNI: Sinking the Java security model into the C
D Chisnall, B Davis, K Gudka, D Brazdil, A Joannou, J Woodruff, ...
ACM SIGOPS Operating Systems Review 51 (2), 569-583, 2017
Cheri concentrate: Practical compressed capabilities
J Woodruff, A Joannou, H Xia, A Fox, RM Norton, D Chisnall, B Davis, ...
IEEE Transactions on Computers 68 (10), 1455-1469, 2019
Lock inference in the presence of large libraries
K Gudka, T Harris, S Eisenbach
European Conference on Object-Oriented Programming, 308-332, 2012
Cornucopia: Temporal safety for cheri heaps
NW Filardo, BF Gutstein, J Woodruff, S Ainsworth, L Paul-Trifu, B Davis, ...
2020 IEEE Symposium on Security and Privacy (SP), 608-625, 2020
TESLA: temporally enhanced system logic assertions.
J Anderson, RNM Watson, D Chisnall, K Gudka, I Marinos, B Davis
EuroSys, 19:1-19:14, 2014
CheriRTOS: A Capability Model for Embedded Devices
H Xia, J Woodruff, H Barral, L Esswood, A Joannou, R Kovacsics, ...
2018 IEEE 36th International Conference on Computer Design (ICCD), 92-99, 2018
Exploring compartmentalisation hypotheses with SOAAP
K Gudka, RNM Watson, S Hand, B Laurie, A Madhavapeddy
2012 IEEE Sixth International Conference on Self-Adaptive and Self …, 2012
Clean application compartmentalization with SOAAP (extended version)
K Gudka, RNM Watson, J Anderson, D Chisnall, B Davis, B Laurie, ...
University of Cambridge, Computer Laboratory, 2015
Lock Inference for Java
K Gudka
Imperial College London, 2013
Implementing atomic sections using lock inference
K Gudka
Fast multi-level locks for java
K Gudka, S Eisenbach
Position paper presented at the Workshop on Exploiting Concurrency …, 2012
Cornucopia: Temporal safety for CHERI heaps
N Wesley Filardo, BF Gutstein, J Woodruff, S Ainsworth, L Paul-Trifu, ...
Towards a Theory of Application Compartmentalisation
RNM Watson, SJ Murdoch, K Gudka, J Anderson, PG Neumann, B Laurie
Cambridge International Workshop on Security Protocols, 19-27, 2013
Improving the performance of Atomic Sections Transfer Report
K Gudka
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20