Jails: Confining the omnipotent root PH Kamp, RNM Watson Proceedings of the 2nd International SANE Conference, 2000 | 521 | 2000 |
The CHERI capability model: Revisiting RISC in an age of risk J Woodruff, RNM Watson, D Chisnall, SW Moore, J Anderson, B Davis, ... | 393* | |
Ignoring the great firewall of china R Clayton, SJ Murdoch, RNM Watson ISJLP 3, 273, 2007 | 388 | 2007 |
The Design and Implementation of the FreeBSD Operating System, Second Edition MK McKusick, GV Neville-Neil, RNM Watson Pearson Education, 2014 | 382* | 2014 |
Ignoring the great firewall of China R Clayton, S Murdoch, RNM Watson Privacy Enhancing Technologies, 20-35, 2006 | 362 | 2006 |
CHERI: A hybrid capability-system architecture for scalable software compartmentalization RNM Watson, J Woodruff, PG Neumann, SW Moore, J Anderson, ... IEEE Symposium on Security and Privacy, 2015 | 356 | 2015 |
Firmament: fast, centralized cluster scheduling at scale I Gog, M Schwarzkopf, A Gleave, RNM Watson, S Hand Proceedings of OSDI’16: 12th USENIX Symposium on Operating Systems Design …, 2016 | 283 | 2016 |
Queues don’t matter when you can JUMP them! MP Grosvenor, M Schwarzkopf, I Gog, RNM Watson, AW Moore, S Hand, ... 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2015 | 264 | 2015 |
Capsicum: practical capabilities for UNIX RNM Watson, J Anderson, B Laurie, K Kennaway USENIX Security, 2010 | 258 | 2010 |
Network stack specialization for performance I Marinos, RNM Watson, M Handley Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, 9, 2013 | 228 | 2013 |
Applying Provenance in APT Monitoring and Analysis G Jenkinson, L Carata, N Balakrishnan, T Bytheway, R Sohan, ... ACM Special Interest Group on Programming Languages, 2017 | 183* | 2017 |
Into the depths of C: elaborating the de facto standards K Memarian, J Matthiesen, J Lingard, K Nienhuis, D Chisnall, ... Proceedings of the 37th ACM SIGPLAN Conference on Programming Language …, 2016 | 131 | 2016 |
System and method for transacting a validated application session in a networked computing environment RNM Watson, O Gudmundsson, D Kindred US Patent 6,779,033, 2004 | 127 | 2004 |
Exploiting concurrency vulnerabilities in system call wrappers RNM Watson Proceedings of the first USENIX workshop on Offensive Technologies, 2, 2007 | 125 | 2007 |
Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 5) RNM Watson, PG Neumann, J Woodruff, M Roe, J Anderson, D Chisnall, ... University of Cambridge, Computer Laboratory, 2016 | 117 | 2016 |
Design and implementation of the TrustedBSD MAC Framework R Watson, B Feldman, A Migus, C Vance DARPA Information Survivability Conference and Exposition, 2003. Proceedings …, 2003 | 115* | 2003 |
Beyond the PDP-11: Architectural support for a memory-safe C abstract machine D Chisnall, C Rothwell, RNM Watson, J Woodruff, M Vadera, SW Moore, ... Proceedings of the Twentieth International Conference on Architectural …, 2015 | 112 | 2015 |
System and method for preventing a spoofed remote procedure call denial of service attack in a networked computing environment RNM Watson, O Gudmundsson US Patent 6,775,704, 2004 | 108 | 2004 |
Clean Application Compartmentalization with SOAAP K Gudka, RNM Watson, J Anderson, D Chisnall, B Davis, B Laurie, ... Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 103 | 2015 |
Metrics for security and performance in low-latency anonymity systems SJ Murdoch, RNM Watson International Symposium on Privacy Enhancing Technologies Symposium, 115-132, 2008 | 102 | 2008 |