Loading...

Tag trends are in beta. Feedback? Thoughts? Email me at [email protected]

Implementation of Functional Languages Using Custom Hardware (1985)

Rossfest Symposium and Festschrift in memory of Ross Anderson

Baking Pi – Operating Systems Development (2012)

BCPL evolved from CPL. (2021) [pdf]

The CHERI Instruction-Set Architecture, Version 9

The Cerberus C semantics [pdf]

JBIG-KIT lossless image compression library

The CHERI capability model: Revisiting RISC in an age of risk

Side Channels

An introduction to inertial navigation

A summary of the international standard date and time notation (2004)

Cheri C/C++ Programming Guide

Capability Hardware Enhanced RISC Instructions (CHERI)

Copy Protection in Modern Microcontrollers (2001)

Formal verification of IA-64 division algorithms (2000)

“Proof-of-Work” Proves Not to Work (2004)

How much is a mechanized proof worth, certification-wise?

Young Persons Guide to BCPL Programming on the Raspberry Pi

Inline and Sideline Approaches for Low-Cost Memory Safety in C

Predicting visible flicker in temporally changing images (2020)

Breaking copy protection in microcontrollers (2001)

Security Engineering - A Guide to BuildingDependable Distributed Systems

Cheri C/C++ Programming Guide: Capability Hardware Enhanced RISC Instructions

REMS - Rigorous Engineering of Mainstream Systems

Corecursion and coinduction: what they are and how they relate to recursion and induction

Corecursion and coinduction: how they relate to recursion and induction

Identifying Unintended Harms of Cybersecurity Countermeasures

The Arm Morello Board

International Standard Paper Sizes

ASAP: As Static As Possible memory management

More →