Остановите войну!
for scientists:
default search action
Ben Laurie
- > Home > Persons > Ben Laurie
Publications
- 2023
- [c22]Saar Amar, David Chisnall, Tony Chen, Nathaniel Wesley Filardo, Ben Laurie, Kunyan Liu, Robert M. Norton, Simon W. Moore, Yucong Tao, Robert N. M. Watson, Hongyan Xia:
CHERIoT: Complete Memory Safety for Embedded Devices. MICRO 2023: 641-653 - 2021
- [i9]Ben Laurie, Eran Messeri, Rob Stradling:
Certificate Transparency Version 2.0. RFC 9162: 1-53 (2021) - 2020
- [i8]Miles Brundage, Shahar Avin, Jasmine Wang, Haydn Belfield, Gretchen Krueger, Gillian K. Hadfield, Heidy Khlaaf, Jingying Yang, Helen Toner, Ruth Fong, Tegan Maharaj, Pang Wei Koh, Sara Hooker, Jade Leung, Andrew Trask, Emma Bluemke, Jonathan Lebensold, Cullen O'Keefe, Mark Koren, Théo Ryffel, J. B. Rubinovitz, Tamay Besiroglu, Federica Carugati, Jack Clark, Peter Eckersley, Sarah de Haas, Maritza Johnson, Ben Laurie, Alex Ingerman, Igor Krawczuk, Amanda Askell, Rosario Cammarota, Andrew Lohn, David Krueger, Charlotte Stix, Peter Henderson, Logan Graham, Carina Prunkl, Bianca Martin, Elizabeth Seger, Noa Zilberman, Seán Ó hÉigeartaigh, Frens Kroeger, Girish Sastry, Rebecca Kagan, Adrian Weller, Brian Tse, Elizabeth Barnes, Allan Dafoe, Paul Scharre, Ariel Herbert-Voss, Martijn Rasser, Shagun Sodhani, Carrick Flynn, Thomas Krendl Gilbert, Lisa Dyer, Saif Khan, Yoshua Bengio, Markus Anderljung:
Toward Trustworthy AI Development: Mechanisms for Supporting Verifiable Claims. CoRR abs/2004.07213 (2020) - [i7]Alastair Reid, Luke Church, Shaked Flur, Sarah de Haas, Maritza Johnson, Ben Laurie:
Towards making formal methods normal: meeting developers where they are. CoRR abs/2010.16345 (2020) - 2019
- [c20]Brooks Davis, Robert N. M. Watson, Alexander Richardson, Peter G. Neumann, Simon W. Moore, John Baldwin, David Chisnall, Jessica Clarke, Nathaniel Wesley Filardo, Khilan Gudka, Alexandre Joannou, Ben Laurie, A. Theodore Markettos, J. Edward Maste, Alfredo Mazzinghi, Edward Tomasz Napierala, Robert M. Norton, Michael Roe, Peter Sewell, Stacey D. Son, Jonathan Woodruff:
CheriABI: Enforcing Valid Pointer Provenance and Minimizing Pointer Privilege in the POSIX C Run-time Environment. ASPLOS 2019: 379-393 - [c19]Yutian Chen, Yannis M. Assael, Brendan Shillingford, David Budden, Scott E. Reed, Heiga Zen, Quan Wang, Luis C. Cobo, Andrew Trask, Ben Laurie, Çaglar Gülçehre, Aäron van den Oord, Oriol Vinyals, Nando de Freitas:
Sample Efficient Adaptive Text-to-Speech. ICLR (Poster) 2019 - [c18]Brendan Shillingford, Yannis M. Assael, Matthew W. Hoffman, Thomas Paine, Cían Hughes, Utsav Prabhu, Hank Liao, Hasim Sak, Kanishka Rao, Lorrayne Bennett, Marie Mulville, Misha Denil, Ben Coppin, Ben Laurie, Andrew W. Senior, Nando de Freitas:
Large-Scale Visual Speech Recognition. INTERSPEECH 2019: 4135-4139 - 2018
- [i6]Brendan Shillingford, Yannis M. Assael, Matthew W. Hoffman, Thomas Paine, Cían Hughes, Utsav Prabhu, Hank Liao, Hasim Sak, Kanishka Rao, Lorrayne Bennett, Marie Mulville, Ben Coppin, Ben Laurie, Andrew W. Senior, Nando de Freitas:
Large-Scale Visual Speech Recognition. CoRR abs/1807.05162 (2018) - [i5]Yutian Chen, Yannis M. Assael, Brendan Shillingford, David Budden, Scott E. Reed, Heiga Zen, Quan Wang, Luis C. Cobo, Andrew Trask, Ben Laurie, Çaglar Gülçehre, Aäron van den Oord, Oriol Vinyals, Nando de Freitas:
Sample Efficient Adaptive Text-to-Speech. CoRR abs/1809.10460 (2018) - 2017
- [c17]David Chisnall, Brooks Davis, Khilan Gudka, David Brazdil, Alexandre Joannou, Jonathan Woodruff, A. Theodore Markettos, J. Edward Maste, Robert M. Norton, Stacey D. Son, Michael Roe, Simon W. Moore, Peter G. Neumann, Ben Laurie, Robert N. M. Watson:
CHERI JNI: Sinking the Java Security Model into the C. ASPLOS 2017: 569-583 - 2016
- [j7]Robert N. M. Watson, Robert M. Norton, Jonathan Woodruff, Simon W. Moore, Peter G. Neumann, Jonathan Anderson, David Chisnall, Brooks Davis, Ben Laurie, Michael Roe, Nirav H. Dave, Khilan Gudka, Alexandre Joannou, A. Theodore Markettos, Ed Maste, Steven J. Murdoch, Colin Rothwell, Stacey D. Son, Munraj Vadera:
Fast Protection-Domain Crossing in the CHERI Capability-System Architecture. IEEE Micro 36(5): 38-49 (2016) - [c16]Alexander De Luca, Sauvik Das, Martin Ortlieb, Iulia Ion, Ben Laurie:
Expert and Non-Expert Attitudes towards (Secure) Instant Messaging. SOUPS 2016: 147-157 - 2015
- [c15]Khilan Gudka, Robert N. M. Watson, Jonathan Anderson, David Chisnall, Brooks Davis, Ben Laurie, Ilias Marinos, Peter G. Neumann, Alex Richardson:
Clean Application Compartmentalization with SOAAP. CCS 2015: 1016-1031 - [c14]Laurent Chuat, Pawel Szalachowski, Adrian Perrig, Ben Laurie, Eran Messeri:
Efficient gossip protocols for verifying the consistency of Certificate logs. CNS 2015: 415-423 - [c13]Robert N. M. Watson, Jonathan Woodruff, Peter G. Neumann, Simon W. Moore, Jonathan Anderson, David Chisnall, Nirav H. Dave, Brooks Davis, Khilan Gudka, Ben Laurie, Steven J. Murdoch, Robert M. Norton, Michael Roe, Stacey D. Son, Munraj Vadera:
CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization. IEEE Symposium on Security and Privacy 2015: 20-37 - [i4]Laurent Chuat, Pawel Szalachowski, Adrian Perrig, Ben Laurie, Eran Messeri:
Efficient Gossip Protocols for Verifying the Consistency of Certificate Logs. CoRR abs/1511.01514 (2015) - 2014
- [c12]Jonathan Woodruff, Robert N. M. Watson, David Chisnall, Simon W. Moore, Jonathan Anderson, Brooks Davis, Ben Laurie, Peter G. Neumann, Robert M. Norton, Michael Roe:
The CHERI capability model: Revisiting RISC in an age of risk. ISCA 2014: 457-468 - 2013
- [c11]Robert N. M. Watson, Steven J. Murdoch, Khilan Gudka, Jonathan Anderson, Peter G. Neumann, Ben Laurie:
Towards a Theory of Application Compartmentalisation. Security Protocols Workshop 2013: 19-27 - [i3]Ben Laurie, Adam Langley, Emilia Käsper:
Certificate Transparency. RFC 6962: 1-27 (2013) - 2012
- [j4]Robert N. M. Watson, Jonathan Anderson, Ben Laurie, Kris Kennaway:
A taste of Capsicum: practical capabilities for UNIX. Commun. ACM 55(3): 97-104 (2012) - [c10]Khilan Gudka, Robert N. M. Watson, Steven Hand, Ben Laurie, Anil Madhavapeddy:
Exploring Compartmentalisation Hypotheses with SOAAP. SASO Workshops 2012: 23-30 - 2010
- [j2]Robert N. M. Watson, Jonathan Anderson, Ben Laurie, Kris Kennaway:
Introducing Capsicum: Practical Capabilities for UNIX. login Usenix Mag. 35(6) (2010) - [c8]George Danezis, Claudia Díaz, Carmela Troncoso, Ben Laurie:
Drac: An Architecture for Anonymous Low-Volume Communications. Privacy Enhancing Technologies 2010: 202-219 - [c7]Robert N. M. Watson, Jonathan Anderson, Ben Laurie, Kris Kennaway:
Capsicum: Practical Capabilities for UNIX. USENIX Security Symposium 2010: 29-46 - 2007
- [c5]George Danezis, Ben Laurie:
Private Yet Abuse Resistant Open Publishing. Security Protocols Workshop 2007: 222-243 - 2004
- [c1]George Danezis, Ben Laurie:
Minx: a simple and efficient anonymous packet format. WPES 2004: 59-65
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-01-01 20:36 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint