Back to Results
First PageMeta Content
Real-time operating systems / Memory management / Central processing unit / Virtual machines / Access control / Capability-based security / Kernel / EROS / Ring / Computer architecture / System software / Computing


Unpublished workshop paper for RESoLVE’12 - March 3, [removed]London, UK CHERI: a research platform deconflating
Add to Reading List

Document Date: 2012-03-17 19:25:43


Open Document

File Size: 222,67 KB

Share Result on Facebook

City

Austin / Las Vegas / Waltham / Boston / New York / Washington / DC / Cambridge / London / /

Company

Google Inc. / Capability-Based Computer Systems / Altera / Air Force Research Laboratory / Bluespec Inc. / SRI International / CHERI / Addison-Wesley Longman Publishing Co. Inc. / Needham / /

Country

Netherlands / United States / /

/

Facility

Cambridge steven.murdoch@cl.cam.ac.uk Philip Paeps Michael Roe Hassen Saidi NixSys BVB philip.paeps@cl.cam.ac.uk University of Cambridge michael.roe@cl.cam.ac.uk SRI International / University of Cambridge jonathan.woodruff@cl.cam.ac.uk Jonathan Anderson Ross Anderson Nirav Dave University / University of Cambridge simon.moore@cl.cam.ac.uk University / Carnegie Mellon University / C library / Robert N.M. Watson Peter G. Neumann Jonathan Woodruff University / Cambridge jonathan.anderson@cl.cam.ac.uk University of Cambridge / CPU pipeline / Air Force Research Laboratory / Massachusetts Institute of Technology / /

IndustryTerm

software compatibility / tool chain / capability systems / software run-time / system software space / low-energy environments / software risk / space memory management / data processing libraries / revised hardware-software model / least trustworthy software / capability management / web browser / software memory models / software thread / Open source software systems / software-based fault isolation / Energy use / level applications / hybrid capability system / open source software / greater software compartmentalisation / legacy software libraries / software capability systems / longer-term solution / software backward compatibility / web browser zlib / software bugs / experimental platform spanning hardware / user applications / application software / pure software simulation / software models / web programs / risky software components / begun adapting commodity software packages / hardware-software interface / application software compartmentalisation / software requiring / software architectures / pure software enforcement models / high-level system software architecture / in-address-space software compartmentalisation / unmodified applications / software experimentation / web browsers / hybrid software models / hardware support / even web browsers / software compartmentalisation / software vs. / capability-aware software / capability-aware applications / software components / hardware-software interface research / experimental software stack / hybrid capability operating systems / conventional software designs / hostile computing environments / system software compartmentalisation / software systems / low-level software design / potential operational uses / network stack packet processing / trustworthy systems / incremental software adoption path / software environment / software stacks / software vulnerabilities / software-based static / capabilityunaware applications / dynamic enforcement using software / software compartmentalisation properties / software-defined policy / trusted software components / capability-oblivious applications / fine-grained compartmentalisation technology / software-based protection / /

NaturalFeature

Legba fall / /

OperatingSystem

UNIX / FreeBSD / BSD / PSOS / Linux / HYDRA / UNIX system / Multics / GNU / /

Organization

Defense Advanced Research Projects Agency / Massachusetts Institute of Technology / USENIX Association / Computer Science Department / Computer Science and Artificial Intelligence Lab / U.S. Air Force Cryptographic Modernization Office / Carnegie Mellon University / Cambridge jonathan.woodruff@cl.cam.ac.uk Jonathan Anderson Ross Anderson Nirav Dave University of Cambridge / Robert N.M. Watson Peter G. Neumann Jonathan Woodruff University of Cambridge robert.watson@cl.cam.ac.uk SRI International / MIT / Cambridge jonathan.anderson@cl.cam.ac.uk University of Cambridge / University of Cambridge / Department of Defense / IEEE Computer Society / New Kernel Foundation for UNIX Development / /

Person

J. Saltzer / M. Schroeder / Rance DeLong / Ben Laurie Simon / J. Thomas F. Knight / Pure / Andrew Moore / Patrick Lincoln / Xen / Robert Norton / Will Morland / Anil Madhavapeddy / Gregory Chadwick / John Rushby / Steven Hand / Wojciech Koszek / Ilias Marinos / Jonathan Anderson Ross Anderson Nirav / Robert N.M. Watson Peter / Peter G. Neumann Jonathan / Philip Paeps Michael Roe Hassen / /

Position

capability application stack C++ RT / libc executive libc executive Network stack Hybrid Capsicum kernel Address / device driver / supervisor / optional hardware page-table walker / programmer / R. N. / C++ RT / space executive / management and capability executive / /

Product

C-0237 / Capsicum / /

ProgrammingLanguage

Java / C / Python / Haskell / Verilog / C++ / /

ProvinceOrState

New York / Texas / Nevada / Massachusetts / /

PublishedMedium

Lecture Notes in Computer Science / /

Region

North Holland / Asia-Pacific / /

Technology

FPGA / Linux / API / Cache Memory / operating system / Shared memory / VHDL / Verilog / flow control / Java / virtual memory / PSOS / fine-grained compartmentalisation technology / UNIX / operating systems / UNIX system / paging / simulation / /

SocialTag