A
Alexander Richardson
Researcher at University of Cambridge
Publications - 19
Citations - 357
Alexander Richardson is an academic researcher from University of Cambridge. The author has contributed to research in topics: Memory safety & Pointer (computer programming). The author has an hindex of 8, co-authored 19 publications receiving 229 citations. Previous affiliations of Alexander Richardson include Hewlett-Packard.
Papers
More filters
Proceedings ArticleDOI
Clean Application Compartmentalization with SOAAP
Khilan Gudka,Robert N. M. Watson,Jonathan Anderson,David Chisnall,Brooks Davis,Ben Laurie,Ilias Marinos,Peter G. Neumann,Alexander Richardson +8 more
TL;DR: This work presents a new conceptual framework embodied in an LLVM-based tool: the Security-Oriented Analysis of Application Programs (SOAAP) that allows programmers to reason about compartmentalization using source-code annotations (compartmentalization hypotheses).
Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 7)
Robert N. M. Watson,Peter G. Neumann,Jonathan Woodruff,Michael Roe,Hesham Almatary,Jonathan Anderson,John Baldwin,David Chisnall,Brooks Davis,Nathaniel Wesley Filardo,Alexandre Joannou,Ben Laurie,A. Theodore Markettos,Simon W. Moore,Steven J. Murdoch,Kyndylan Nienhuis,Robert M. Norton,Alexander Richardson,Peter Rugg,Peter Sewell,Stacey Son,Hongyan Xia +21 more
TL;DR: This document describes the rapidly maturing design for the Capability Hardware Enhanced RISC Instructions (CHERI) Instruction-Set Architecture (ISA), and provides reference documentation for the CHERI instruction-set architecture and potential memory models, along with their requirements.
Proceedings ArticleDOI
Efficient Tagged Memory
Alexandre Joannou,Jonathan Woodruff,Robert Kovacsics,Simon W. Moore,Alex Bradbury,Hongyan Xia,Robert N. M. Watson,David Chisnall,Michael Roe,Brooks Davis,Edward Napierala,John Baldwin,Khilan Gudka,Peter G. Neumann,Alfredo Mazzinghi,Alexander Richardson,Stacey Son,A. Theodore Markettos +17 more
TL;DR: The cache behavior of an in-memory tag table is characterized and it is demonstrated that an optimized implementation can typically achieve a near-zero memory traffic overhead.
Proceedings ArticleDOI
CheriABI: Enforcing Valid Pointer Provenance and Minimizing Pointer Privilege in the POSIX C Run-time Environment
Brooks Davis,Robert N. M. Watson,Alexander Richardson,Peter G. Neumann,Simon W. Moore,John Baldwin,David Chisnall,Jessica Clarke,Nathaniel Wesley Filardo,Khilan Gudka,Alexandre Joannou,Ben Laurie,A. Theodore Markettos,J. Edward Maste,Alfredo Mazzinghi,Edward Napierala,Robert M. Norton,Michael Roe,Peter Sewell,Stacey Son,Jonathan Woodruff +20 more
TL;DR: This work describes the first adaptation of a full C-language operating system (FreeBSD) with an enterprise database (PostgreSQL) for complete spatial and referential memory safety and shows that awareness of abstract capabilities, coupled with CHERI architectural capabilities, can provide more complete protection, strong compatibility, and acceptable performance overhead compared with the pre-CHERI baseline and software-only approaches.
Proceedings ArticleDOI
CHERIvoke: Characterising Pointer Revocation using CHERI Capabilities for Temporal Memory Safety
Hongyan Xia,Jonathan Woodruff,Sam Ainsworth,Nathaniel Wesley Filardo,Michael Roe,Alexander Richardson,Peter Rugg,Peter G. Neumann,Simon W. Moore,Robert N. M. Watson,Timothy M. Jones +10 more
TL;DR: It is shown that CHERI capabilities can be used as a foundation to enable low-cost heap temporal safety by facilitating out-of-date pointer revocation, as capabilities enable precise and efficient identification and invalidation of pointers, even when using unsafe languages such as C.