Zobrazeno 1 - 10
of 239
pro vyhledávání: '"Peter G. Neumann"'
Autor:
Peter G. Neumann
Publikováno v:
Communications of the ACM. 66:28-30
Surveying the nontechnical issues interwoven with computer-related technologies.
Autor:
Peter G. Neumann
Publikováno v:
Communications of the ACM. 65:32-35
Considering how to achieve the long-term goal to systemically reduce risks.
Autor:
Rebecca T. Mercuri, Peter G. Neumann
Publikováno v:
Communications of the ACM. 64:24-30
With 90% of the 2020 U.S. general election ballot contents verifiable by paper, why do only 65% of voters trust the results?
Autor:
Peter G. Neumann
Publikováno v:
Communications of the ACM. 63:23-27
Almost everything is somehow interrelated with everything else---and that should not surprise us.
Autor:
Alexandre Joannou, Peter Rugg, Jonathan Woodruff, Franz A. Fuchs, Marno Van der Maas, Matthew Naylor, Michael Roe, Robert N. M. Watson, Peter G. Neumann, Simon W. Moore
Publikováno v:
IEEE Design & Test. :1-1
TestRIG (Testing with Random Instruction Generation) is a testing framework for RISC-V implementations. The RISC-V community has standardized a formal model of the architecture in the Sail language, giving a human-readable specification that can also
Autor:
Peter G. Neumann
Publikováno v:
ACM SIGSOFT Software Engineering Notes. 43:13-20
Edited by PGN (Risks Forum Moderator, with contribu- tions by others as indicated. Opinions are individual rather than organizational, with usual disclaimers implied. We ad- dress problems relating to software, hardware, people, and other circumstanc
Autor:
John Baldwin, Simon W. Moore, A. Theodore Markettos, Peter G. Neumann, Robert N. M. Watson, Ruslan Bukin
Publikováno v:
HASP@MICRO
We propose new solutions that can efficiently address the problem of malicious memory access from pluggable computer peripherals and microcontrollers embedded within a system-on-chip. This problem represents a serious emerging threat to total-system
Autor:
Peter Sewell, Khilan Gudka, David Chisnall, Alexander Richardson, Robert N. M. Watson, Alexandre Joannou, Stacey Son, John Baldwin, Edward Napierala, Michael Roe, Robert M. Norton, Nathaniel Wesley Filardo, Alfredo Mazzinghi, Simon W. Moore, Jessica Clarke, Jonathan Woodruff, Sam Ainsworth, Brooks Davis, Brett F. Gutstein, Peter G. Neumann, Lucian Paul-Trifu, A. Theodore Markettos, Hongyan Xia, Timothy M. Jones
Publikováno v:
Proceedings of the 41st IEEE Symposium on Security and Privacy (SP)
2020 IEEE Symposium on Security and Privacy (SP)
IEEE Symposium on Security and Privacy
2020 IEEE Symposium on Security and Privacy (SP)
IEEE Symposium on Security and Privacy
Use-after-free violations of temporal memory safety continue to plague software systems, underpinning many high-impact exploits. The CHERI capability system shows great promise in achieving C and C++ language spatial memory safety, preventing out-of-
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::aca2234b627b684664fc034652d5b50c
Autor:
Robert N. M. Watson, Peter G. Neumann, Jonathan Woodruff, Michael Roe, Hesham Almatary, Jonathan Anderson, John Baldwin, Graeme Barnes, David Chisnall, Jessica Clarke, Brooks Davis, Lee Eisen, Nathaniel Wesley Filardo, Richard Grisenthwaite, Alexandre Joannou, Ben Laurie, A. Theodore Markettos, Simon W. Moore, Steven J. Murdoch, Kyndylan Nienhuis, Robert Norton, Alexander Richardson, Peter Rugg, Peter Sewell, Stacey Son, Hongyan Xia
This technical report describes CHERI ISAv8, the eighth version of the CHERI architecture being developed by SRI International and the University of Cambridge. This design captures ten years of research, development, experimentation, refinement, form
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1f5b2e44e3ab9cca15f234ee537f453d
Autor:
Robert N. M. Watson, Alexander Richardson, Brooks Davis, John Baldwin, David Chisnall, Jessica Clarke, Nathaniel Filardo, Simon W. Moore, Edward Napierala, Peter Sewell, Peter G. Neumann
This document is a brief introduction to the CHERI C/C++ programming languages. We explain the principles underlying these language variants, and their grounding in CHERI’s multiple architectural instantiations: CHERI-MIPS, CHERI-RISC-V, and Arm’
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ba3b9515f6abc76a89638d1b6323f291