Follow
Jonathan Anderson
Title
Cited by
Cited by
Year
The CHERI capability model: Revisiting RISC in an age of risk
J Woodruff, RNM Watson, D Chisnall, SW Moore, J Anderson, B Davis, ...
ACM SIGARCH Computer Architecture News 42 (3), 457-468, 2014
4352014
CHERI: A hybrid capability-system architecture for scalable software compartmentalization
RNM Watson, J Woodruff, PG Neumann, SW Moore, J Anderson, ...
Security and Privacy (SP), 2015 IEEE Symposium on, 20-37, 2015
3932015
Prying data out of a social network
J Bonneau, J Anderson, G Danezis
2009 International Conference on Advances in Social Network Analysis and …, 2009
2832009
Capsicum: practical capabilities for UNIX
RNM Watson, J Anderson, B Laurie, K Kennaway
USENIX Security Symposium, 2010
2732010
Eight friends are enough: social graph approximation via public listings
J Bonneau, J Anderson, R Anderson, F Stajano
Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, 13-18, 2009
1742009
Privacy suites: Shared privacy for social networks
J Bonneau, J Anderson, L Church
Symposium on Usable Privacy and Security (SOUPS), 2009
1662009
Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 5)
RNM Watson, PG Neumann, J Woodruff, M Roe, J Anderson, D Chisnall, ...
University of Cambridge, Computer Laboratory, 2016
1332016
Privacy-enabling social networking over untrusted networks
J Anderson, C Diaz, J Bonneau, F Stajano
Workshop on Online Social Networks (WOSN), 1-6, 2009
1212009
Clean Application Compartmentalization with SOAAP
K Gudka, RNM Watson, J Anderson, D Chisnall, B Davis, B Laurie, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1092015
Privacy stories: Confidence in privacy behaviors through end user programming
L Church, J Anderson, J Bonneau, F Stajano
Symposium on Usable Privacy and Security (SOUPS), 2009
642009
Fast Protection-Domain Crossing in the CHERI Capability-System Architecture
RNM Watson, RM Norton, J Woodruff, SW Moore, PG Neumann, ...
IEEE Micro 36 (5), 38-49, 2016
562016
Inglorious installers: security in the application marketplace
J Anderson, J Bonneau, F Stajano
Workshop on the Economics of Information Security (WEIS), 2010
392010
A taste of Capsicum: practical capabilities for UNIX
RNM Watson, J Anderson, B Laurie, K Kennaway
Communications of the ACM 55 (3), 97-104, 2012
372012
Capability hardware enhanced RISC instructions: CHERI instruction-set architecture
RNM Watson, PG Neumann, J Woodruff, M Roe, J Anderson, D Chisnall, ...
University of Cambridge, Computer Laboratory, 2015
342015
CHERI: a research platform deconflating hardware virtualization and protection
RNM Watson, PG Neumann, J Woodruff, J Anderson, R Anderson, ...
Runtime Environments, Systems, Layering and Virtualized Environments …, 2012
322012
Must social networking conflict with privacy?
J Anderson, F Stajano
IEEE security & privacy 11 (3), 51-60, 2013
212013
Applying Provenance in {APT} Monitoring and Analysis: Practical Challenges for Scalable, Efficient and Trustworthy Distributed Provenance
G Jenkinson, L Carata, T Bytheway, R Sohan, RNM Watson, J Anderson, ...
9th {USENIX} Workshop on the Theory and Practice of Provenance (TaPP 2017), 2017
152017
TESLA: temporally enhanced system logic assertions
J Anderson, RNM Watson, D Chisnall, K Gudka, I Marinos, B Davis
Proceedings of the Ninth European Conference on Computer Systems, 1-14, 2014
152014
Declarative, temporal, and practical programming with capabilities
WR Harris, S Jha, T Reps, J Anderson, RNM Watson
2013 IEEE Symposium on Security and Privacy, 18-32, 2013
152013
Security Protocols XXI: 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers
B Christianson, J Malcolm, F Stajano, J Anderson, J Bonneau
Springer, 2013
14*2013
The system can't perform the operation now. Try again later.
Articles 1–20