@@ -2612,3 +2612,50 @@ @techreport{watson20chericprogramming
26122612 number = "UCAM-CL-TR-947",
26132613 doi = "10.48456/tr-947",
26142614}
2615+
2616+ @techreport{watson20cheriintroduction,
2617+ author = "Robert N. M. Watson and Simon W. Moore and Peter Sewell and Peter G. Neumann",
2618+ title = "An Introduction to CHERI",
2619+ year = 2019,
2620+ month = Sep,
2621+ url = "https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-941.pdf",
2622+ institution = "University of Cambridge",
2623+ number = "UCAM-CL-TR-941",
2624+ doi = "10.48456/tr-941",
2625+ }
2626+
2627+ @book{levy84capability,
2628+ title = "Capability-based computer systems",
2629+ author= "Levy, Henry M",
2630+ year= 1984,
2631+ publisher = "Digital Press",
2632+ url = "https://homes.cs.washington.edu/~levy/capabook/"
2633+ }
2634+
2635+ @PhdThesis{miller06robust,
2636+ author = "Mark Samuel Miller",
2637+ title = "Robust Composition: Towards a Unified Approach to
2638+ Access Control and Concurrency Control",
2639+ year = 2006,
2640+ month = May,
2641+ school = "Johns Hopkins University",
2642+ url = "http://erights.org/talks/thesis/"
2643+ }
2644+
2645+ @inproceedings{brooks19cheriabi,
2646+ author = "Davis, Brooks and Watson, Robert N. M. and
2647+ Richardson, Alexander and Neumann, Peter G. and Moore, Simon W. and
2648+ Baldwin, John and Chisnall, David and Clarke, James and
2649+ Filardo, Nathaniel Wesley and Gudka, Khilan and Joannou, Alexandre and
2650+ Laurie, Ben and Markettos, A. Theodore and Maste, J. Edward and
2651+ Mazzinghi, Alfredo and Napierala, Edward Tomasz and
2652+ Norton, Robert M. and Roe, Michael and Sewell, Peter and
2653+ Son, Stacey and Woodruff, Jonathan",
2654+ title = "{CheriABI}: Enforcing Valid Pointer Provenance and Minimizing Pointer Privilege in the {POSIX} {C} Run-Time Environment",
2655+ month = May,
2656+ year = 2019,
2657+ url = "https://doi.org/10.1145/3297858.3304042",
2658+ doi = "10.1145/3297858.3304042",
2659+ booktitle = {ASPLOS},
2660+ pages = 379–393,
2661+ }
0 commit comments