Robert N. M. Watson
Robert N. M. Watson
Professor, Department of Computer Science and Technology, University of Cambridge
Verifierad e-postadress på cl.cam.ac.uk - Startsida
Citeras av
Citeras av
Jails: Confining the omnipotent root
PH Kamp, RNM Watson
Proceedings of the 2nd International SANE Conference, 2000
Ignoring the great firewall of china
R Clayton, SJ Murdoch, RNM Watson
ISJLP 3, 273, 2007
The Design and Implementation of the FreeBSD Operating System, Second Edition
MK McKusick, GV Neville-Neil, RNM Watson
Pearson Education, 2014
The Design and Implementation of the FreeBSD Operating System
MK McKusick, GV Neville-Neil, RNM Watson
Ignoring the great firewall of China
R Clayton, S Murdoch, RNM Watson
Privacy Enhancing Technologies, 20-35, 2006
The CHERI capability model: Revisiting RISC in an age of risk
J Woodruff, RNM Watson, D Chisnall, SW Moore, J Anderson, B Davis, ...
CHERI: A hybrid capability-system architecture for scalable software compartmentalization
RNM Watson, J Woodruff, PG Neumann, SW Moore, J Anderson, ...
IEEE Symposium on Security and Privacy, 2015
Queues don’t matter when you can JUMP them!
MP Grosvenor, M Schwarzkopf, I Gog, RNM Watson, AW Moore, S Hand, ...
12th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2015
Firmament: fast, centralized cluster scheduling at scale
I Gog, M Schwarzkopf, A Gleave, RNM Watson, S Hand
Proceedings of OSDI’16: 12th USENIX Symposium on Operating Systems Design …, 2016
Capsicum: practical capabilities for UNIX
RNM Watson, J Anderson, B Laurie, K Kennaway
USENIX Security, 2010
Network stack specialization for performance
I Marinos, RNM Watson, M Handley
Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, 9, 2013
Applying Provenance in APT Monitoring and Analysis
G Jenkinson, L Carata, N Balakrishnan, T Bytheway, R Sohan, ...
ACM Special Interest Group on Programming Languages, 2017
System and method for transacting a validated application session in a networked computing environment
RNM Watson, O Gudmundsson, D Kindred
US Patent 6,779,033, 2004
Exploiting concurrency vulnerabilities in system call wrappers
RNM Watson
Proceedings of the first USENIX workshop on Offensive Technologies, 2, 2007
Into the depths of C: elaborating the de facto standards
K Memarian, J Matthiesen, J Lingard, K Nienhuis, D Chisnall, ...
Proceedings of the 37th ACM SIGPLAN Conference on Programming Language …, 2016
Beyond the PDP-11: Architectural support for a memory-safe C abstract machine
D Chisnall, C Rothwell, RNM Watson, J Woodruff, M Vadera, SW Moore, ...
Proceedings of the Twentieth International Conference on Architectural …, 2015
System and method for preventing a spoofed remote procedure call denial of service attack in a networked computing environment
RNM Watson, O Gudmundsson
US Patent 6,775,704, 2004
Metrics for security and performance in low-latency anonymity systems
SJ Murdoch, RNM Watson
International Symposium on Privacy Enhancing Technologies Symposium, 115-132, 2008
Strong security for active networks
S Murphy, E Lewis, R Puga, R Watson, R Yee
Open Architectures and Network Programming Proceedings, 2001 IEEE, 63-70, 2001
The TrustedBSD MAC framework: Extensible kernel access control for FreeBSD 5.0
R Watson, W Morrison, C Vance, B Feldman
Proc. 2003 USENIX Annual Technical Conference, 285-296, 2003
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20