Follow
Ben Laurie
Ben Laurie
Google, University of Cambridge, UCL
Verified email at google.com - Homepage
Title
Cited by
Cited by
Year
Certificate Transparency: Public, verifiable, append-only logs
B Laurie
Queue 12 (8), 10-19, 2014
5362014
The CHERI capability model: Revisiting RISC in an age of risk
J Woodruff, RNM Watson, D Chisnall, SW Moore, J Anderson, B Davis, ...
ACM SIGARCH Computer Architecture News 42 (3), 457-468, 2014
4282014
Apache: the definitive guide
B Laurie, P Laurie
O'Reilly Media, Incorporated, 2002
3982002
Toward trustworthy AI development: mechanisms for supporting verifiable claims
M Brundage, S Avin, J Wang, H Belfield, G Krueger, G Hadfield, H Khlaaf, ...
arXiv preprint arXiv:2004.07213, 2020
3952020
Cheri: A hybrid capability-system architecture for scalable software compartmentalization
RNM Watson, J Woodruff, PG Neumann, SW Moore, J Anderson, ...
2015 IEEE Symposium on Security and Privacy, 20-37, 2015
3852015
Certificate Transparency
B Laurie
Communications of the ACM, 2099
324*2099
Capsicum: Practical Capabilities for UNIX.
RNM Watson, J Anderson, B Laurie, K Kennaway
USENIX Security Symposium, 29-46, 2010
2732010
"Proof-of-Work” proves not to work
B Laurie, R Clayton
Workshop on Economics and Information, Security, 2004
2532004
Dns security (dnssec) hashed authenticated denial of existence
B Laurie, G Sisson, R Arends, D Blacka
RFC5155, March, 2008
2242008
Large-scale visual speech recognition
B Shillingford, Y Assael, MW Hoffman, T Paine, C Hughes, U Prabhu, ...
arXiv preprint arXiv:1807.05162, 2018
2062018
Safe active content in sanitized JavaScript
MS Miller, M Samuel, B Laurie, I Awad, M Stay
Google, Inc., Tech. Rep, 2008
1962008
Sample efficient adaptive text-to-speech
Y Chen, Y Assael, B Shillingford, D Budden, S Reed, H Zen, Q Wang, ...
arXiv preprint arXiv:1809.10460, 2018
1612018
Sedimentation and electrophoretic migration of DNA knots and catenanes
AV Vologodskii, NJ Crisona, B Laurie, P Pieranski, V Katritch, J Dubochet, ...
Journal of molecular biology 278 (1), 1-3, 1998
1571998
Capability hardware enhanced RISC instructions: CHERI instruction-set architecture (version 7)
RNM Watson, PG Neumann, J Woodruff, M Roe, H Almatary, J Anderson, ...
University of Cambridge, Computer Laboratory, 2019
1292019
Clean Application Compartmentalization with SOAAP
K Gudka, RNM Watson, J Anderson, D Chisnall, B Davis, B Laurie, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1082015
Efficient gossip protocols for verifying the consistency of certificate logs
L Chuat, P Szalachowski, A Perrig, B Laurie, E Messeri
2015 IEEE Conference on Communications and Network Security (CNS), 415-423, 2015
1062015
Revocation transparency
B Laurie, E Kasper
Google Research, September, 2012
1012012
Internet Engineering Task Force P. Hallam-Baker Internet-Draft Comodo Group Inc. Intended status: Standards Track R. Stradling Expires: January 8, 2012 Comodo CA Ltd.
B Laurie, D Record
93*2011
DNS Certification Authority Authorization (CAA) Resource Record
P Hallam-Baker, R Stradling, B Laurie
932011
CheriABI: Enforcing valid pointer provenance and minimizing pointer privilege in the POSIX C run-time environment
B Davis, RNM Watson, A Richardson, PG Neumann, SW Moore, ...
Proceedings of the Twenty-Fourth International Conference on Architectural …, 2019
922019
The system can't perform the operation now. Try again later.
Articles 1–20