
Robert N. M. Watson
Person information
- affiliation: University of Cambridge, UK
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c36]Michael Dodson, Alastair R. Beresford, Alexander Richardson, Jessica Clarke, Robert N. M. Watson:
CHERI Macaroons: Efficient, host-based access control for cyber-physical systems. EuroS&P Workshops 2020: 688-693 - [c35]Nathaniel Wesley Filardo, Brett F. Gutstein, Jonathan Woodruff, Sam Ainsworth
, Lucian Paul-Trifu, Brooks Davis, Hongyan Xia, Edward Tomasz Napierala, Alexander Richardson, John Baldwin, David Chisnall, Jessica Clarke, Khilan Gudka, Alexandre Joannou, A. Theodore Markettos, Alfredo Mazzinghi, Robert M. Norton, Michael Roe, Peter Sewell, Stacey D. Son, Timothy M. Jones, Simon W. Moore, Peter G. Neumann, Robert N. M. Watson:
Cornucopia: Temporal Safety for CHERI Heaps. IEEE Symposium on Security and Privacy 2020: 608-625 - [c34]Kyndylan Nienhuis, Alexandre Joannou, Thomas Bauereiss, Anthony C. J. Fox, Michael Roe, Brian Campbell, Matthew Naylor, Robert M. Norton, Simon W. Moore, Peter G. Neumann, Ian Stark, Robert N. M. Watson, Peter Sewell:
Rigorous engineering for hardware security: Formal modelling and proof in the CHERI design and implementation process. IEEE Symposium on Security and Privacy 2020: 1003-1020
2010 – 2019
- 2019
- [j12]A. Theodore Markettos, Robert N. M. Watson, Simon W. Moore, Peter Sewell, Peter G. Neumann:
Through computer architecture, darkly. Commun. ACM 62(6): 25-27 (2019) - [j11]Kirk M. Bresniker
, Paolo Faraboschi, Avi Mendelson, Dejan S. Milojicic, Timothy Roscoe, Robert N. M. Watson:
Rack-Scale Capabilities: Fine-Grained Protection for Large-Scale Memories. Computer 52(2): 52-62 (2019) - [j10]Kayvan Memarian, Victor B. F. Gomes, Brooks Davis, Stephen Kell, Alexander Richardson
, Robert N. M. Watson, Peter Sewell:
Exploring C semantics and pointer provenance. Proc. ACM Program. Lang. 3(POPL): 67:1-67:32 (2019) - [j9]Leonid Azriel, Lukas Humbel, Reto Achermann, Alex Richardson
, Moritz Hoffmann, Avi Mendelson, Timothy Roscoe, Robert N. M. Watson, Paolo Faraboschi, Dejan S. Milojicic:
Memory-Side Protection With a Capability Enforcement Co-Processor. ACM Trans. Archit. Code Optim. 16(1): 5:1-5:26 (2019) - [j8]Jonathan Woodruff
, Alexandre Joannou, Hongyan Xia
, Anthony C. J. Fox, Robert M. Norton
, David Chisnall, Brooks Davis, Khilan Gudka, Nathaniel Wesley Filardo, A. Theodore Markettos, Michael Roe, Peter G. Neumann, Robert N. M. Watson, Simon W. Moore
:
CHERI Concentrate: Practical Compressed Capabilities. IEEE Trans. Computers 68(10): 1455-1469 (2019) - [c33]Brooks Davis, Robert N. M. Watson, Alexander Richardson
, Peter G. Neumann, Simon W. Moore, John Baldwin, David Chisnall, James Clarke, Nathaniel Wesley Filardo, Khilan Gudka, Alexandre Joannou, Ben Laurie, A. Theodore Markettos, J. Edward Maste, Alfredo Mazzinghi, Edward Tomasz Napierala, Robert M. Norton, Michael Roe, Peter Sewell, Stacey D. Son, Jonathan Woodruff:
CheriABI: Enforcing Valid Pointer Provenance and Minimizing Pointer Privilege in the POSIX C Run-time Environment. ASPLOS 2019: 379-393 - [c32]Hongyan Xia, Jonathan Woodruff, Sam Ainsworth, Nathaniel Wesley Filardo, Michael Roe, Alexander Richardson
, Peter Rugg, Peter G. Neumann, Simon W. Moore, Robert N. M. Watson, Timothy M. Jones
:
CHERIvoke: Characterising Pointer Revocation using CHERI Capabilities for Temporal Memory Safety. MICRO 2019: 545-557 - [c31]A. Theodore Markettos, Colin Rothwell, Brett F. Gutstein, Allison Pearce, Peter G. Neumann, Simon W. Moore, Robert N. M. Watson:
Thunderclap: Exploring Vulnerabilities in Operating System IOMMU Protection via DMA from Untrustworthy Peripherals. NDSS 2019 - 2018
- [c30]Hongyan Xia
, Jonathan Woodruff, Hadrien Barral, Lawrence Esswood, Alexandre Joannou, Robert Kovacsics, David Chisnall, Michael Roe, Brooks Davis, Edward Napierala, John Baldwin, Khilan Gudka, Peter G. Neumann, Alexander Richardson
, Simon W. Moore, Robert N. M. Watson:
CheriRTOS: A Capability Model for Embedded Devices. ICCD 2018: 92-99 - [c29]Jyothish Soman, Thomas Bytheway, Lucian Carata, Nikilesh D. Balakrishnan, Ripduman Sohan, Robert N. M. Watson:
Structural Analysis of Whole-System Provenance Graphs. IPAW 2018: 241-244 - [c28]Alfredo Mazzinghi, Ripduman Sohan, Robert N. M. Watson:
Pointer Provenance in a Capability Architecture. TaPP 2018 - 2017
- [j7]George V. Neville-Neil, Robert N. M. Watson:
Teaching Operating Systems with FreeBSD through Tracing, Analysis, and Experimentation. login Usenix Mag. 42(1) (2017) - [c27]David Chisnall, Brooks Davis, Khilan Gudka, David Brazdil, Alexandre Joannou, Jonathan Woodruff, A. Theodore Markettos, J. Edward Maste, Robert M. Norton, Stacey D. Son, Michael Roe, Simon W. Moore, Peter G. Neumann, Ben Laurie, Robert N. M. Watson:
CHERI JNI: Sinking the Java Security Model into the C. ASPLOS 2017: 569-583 - [c26]Reto Achermann, Chris I. Dalton, Paolo Faraboschi
, Moritz Hoffmann, Dejan S. Milojicic, Geoffrey Ndu
, Alex Richardson
, Timothy Roscoe, Adrian L. Shaw, Robert N. M. Watson:
Separating Translation from Protection in Address Spaces with Dynamic Remapping. HotOS 2017: 118-124 - [c25]Alexandre Joannou, Jonathan Woodruff, Robert Kovacsics, Simon W. Moore, Alex Bradbury, Hongyan Xia
, Robert N. M. Watson, David Chisnall, Michael Roe, Brooks Davis, Edward Napierala, John Baldwin, Khilan Gudka, Peter G. Neumann, Alfredo Mazzinghi, Alex Richardson
, Stacey D. Son, A. Theodore Markettos:
Efficient Tagged Memory. ICCD 2017: 641-648 - [c24]Ilias Marinos, Robert N. M. Watson, Mark Handley, Randall R. Stewart:
Disk|Crypt|Net: rethinking the stack for high-performance video streaming. SIGCOMM 2017: 211-224 - [c23]Graeme Jenkinson, Lucian Carata, Thomas Bytheway, Ripduman Sohan, Robert N. M. Watson, Jonathan Anderson, Brian J. Kidney, Amanda Strnad, Arun Thomas, George V. Neville-Neil:
Applying Provenance in APT Monitoring and Analysis: Practical Challenges for Scalable, Efficient and Trustworthy Distributed Provenance. TaPP 2017 - 2016
- [j6]Robert N. M. Watson, Robert M. Norton, Jonathan Woodruff, Simon W. Moore, Peter G. Neumann, Jonathan Anderson
, David Chisnall, Brooks Davis, Ben Laurie, Michael Roe, Nirav H. Dave, Khilan Gudka, Alexandre Joannou, A. Theodore Markettos, Ed Maste, Steven J. Murdoch, Colin Rothwell, Stacey D. Son, Munraj Vadera:
Fast Protection-Domain Crossing in the CHERI Capability-System Architecture. IEEE Micro 36(5): 38-49 (2016) - [c22]Ionel Gog, Malte Schwarzkopf, Adam Gleave, Robert N. M. Watson, Steven Hand:
Firmament: Fast, Centralized Cluster Scheduling at Scale. OSDI 2016: 99-115 - [c21]Kayvan Memarian, Justus Matthiesen, James Lingard, Kyndylan Nienhuis, David Chisnall
, Robert N. M. Watson, Peter Sewell
:
Into the depths of C: elaborating the de facto standards. PLDI 2016: 1-15 - [i1]Robert N. M. Watson, Simon W. Moore, Peter G. Neumann:
CHERI: A Hardware-Software System to Support the Principle of Least Privilege. ERCIM News 2016(106) (2016) - 2015
- [c20]David Chisnall
, Colin Rothwell, Robert N. M. Watson, Jonathan Woodruff, Munraj Vadera, Simon W. Moore
, Michael Roe, Brooks Davis, Peter G. Neumann:
Beyond the PDP-11: Architectural Support for a Memory-Safe C Abstract Machine. ASPLOS 2015: 117-130 - [c19]Khilan Gudka, Robert N. M. Watson, Jonathan Anderson
, David Chisnall, Brooks Davis, Ben Laurie, Ilias Marinos, Peter G. Neumann, Alex Richardson
:
Clean Application Compartmentalization with SOAAP. CCS 2015: 1016-1031 - [c18]Matthew P. Grosvenor, Malte Schwarzkopf, Ionel Gog, Robert N. M. Watson, Andrew W. Moore, Steven Hand, Jon Crowcroft:
Queues Don't Matter When You Can JUMP Them! NSDI 2015: 1-14 - [c17]Robert N. M. Watson, Jonathan Woodruff, Peter G. Neumann, Simon W. Moore
, Jonathan Anderson
, David Chisnall, Nirav H. Dave, Brooks Davis, Khilan Gudka, Ben Laurie, Steven J. Murdoch, Robert M. Norton, Michael Roe, Stacey D. Son, Munraj Vadera:
CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization. IEEE Symposium on Security and Privacy 2015: 20-37 - 2014
- [c16]Jonathan Anderson
, Robert N. M. Watson, David Chisnall
, Khilan Gudka, Ilias Marinos, Brooks Davis:
TESLA: temporally enhanced system logic assertions. EuroSys 2014: 19:1-19:14 - [c15]Jonathan Woodruff, Robert N. M. Watson, David Chisnall, Simon W. Moore
, Jonathan Anderson
, Brooks Davis, Ben Laurie, Peter G. Neumann, Robert M. Norton, Michael Roe:
The CHERI capability model: Revisiting RISC in an age of risk. ISCA 2014: 457-468 - [c14]Ilias Marinos, Robert N. M. Watson, Mark Handley:
Network stack specialization for performance. SIGCOMM 2014: 175-186 - 2013
- [j5]Robert N. M. Watson:
A decade of OS access-control extensibility. Commun. ACM 56(2): 52-63 (2013) - [j4]Robert N. M. Watson:
A Decade of OS Access-control Extensibility. ACM Queue 11(1): 20 (2013) - [c13]Ilias Marinos, Robert N. M. Watson, Mark Handley:
Network stack specialization for performance. HotNets 2013: 9:1-9:7 - [c12]William R. Harris, Somesh Jha, Thomas W. Reps, Jonathan Anderson
, Robert N. M. Watson:
Declarative, Temporal, and Practical Programming with Capabilities. IEEE Symposium on Security and Privacy 2013: 18-32 - [c11]Robert N. M. Watson, Steven J. Murdoch, Khilan Gudka, Jonathan Anderson
, Peter G. Neumann, Ben Laurie:
Towards a Theory of Application Compartmentalisation. Security Protocols Workshop 2013: 19-27 - [c10]Robert N. M. Watson:
Towards a Theory of Application Compartmentalisation (Transcript of Discussion). Security Protocols Workshop 2013: 28-38 - 2012
- [j3]Robert N. M. Watson, Jonathan Anderson
, Ben Laurie, Kris Kennaway:
A taste of Capsicum: practical capabilities for UNIX. Commun. ACM 55(3): 97-104 (2012) - [c9]Khilan Gudka, Robert N. M. Watson, Steven Hand, Ben Laurie, Anil Madhavapeddy:
Exploring Compartmentalisation Hypotheses with SOAAP. SASO Workshops 2012: 23-30 - [c8]Jonathan Anderson
, Robert N. M. Watson:
Stayin' Alive: Aliveness as an Alternative to Authentication. Security Protocols Workshop 2012: 242-250 - 2011
- [b1]Robert Nicholas Maxwell Watson:
New approaches to operating system security extensibility. University of Cambridge, UK, 2011 - [c7]Jonathan Anderson
, Frank Stajano, Robert N. M. Watson:
How to Keep Bad Papers Out of Conferences (with Minimum Reviewer Effort). Security Protocols Workshop 2011: 359-367 - 2010
- [j2]Laurel D. Riek, Robert N. M. Watson:
The Age of Avatar Realism. IEEE Robotics Autom. Mag. 17(4): 37-42 (2010) - [j1]Robert N. M. Watson, Jonathan Anderson, Ben Laurie, Kris Kennaway:
Introducing Capsicum: Practical Capabilities for UNIX. login Usenix Mag. 35(6) (2010) - [c6]Robert N. M. Watson, Jonathan Anderson, Ben Laurie, Kris Kennaway:
Capsicum: Practical Capabilities for UNIX. USENIX Security Symposium 2010: 29-46
2000 – 2009
- 2008
- [c5]Steven J. Murdoch, Robert N. M. Watson:
Metrics for Security and Performance in Low-Latency Anonymity Systems. Privacy Enhancing Technologies 2008: 115-132 - 2007
- [c4]Robert N. M. Watson:
Exploiting Concurrency Vulnerabilities in System Call Wrappers. WOOT 2007 - 2006
- [c3]Richard Clayton, Steven J. Murdoch, Robert N. M. Watson:
Ignoring the Great Firewall of China. Privacy Enhancing Technologies 2006: 20-35 - 2002
- [c2]Sandra L. Murphy, Edward T. Lewis, Robert N. M. Watson:
Secure Active Network Prototypes. DANCE 2002: 166-181 - 2001
- [c1]Robert N. M. Watson:
TrustedBSD: Adding Trusted Operating System Features to FreeBSD. USENIX Annual Technical Conference, FREENIX Track 2001: 15-28
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2020-11-11 21:55 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint