Active
Recent
Comments
Search
Login
Login
cl.cam.ac.uk: 25 stories from 41 submitters
7
The CHERI Instruction-Set Architecture, Version 9
☶
pdf
hardware
release
cl.cam.ac.uk
via
nwf
2 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
6
The CHERI capability model: Revisiting RISC in an age of risk
pdf
compilers
plt
security
cl.cam.ac.uk
via
adaszko
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
5
An introduction to inertial navigation
pdf
hardware
science
cl.cam.ac.uk
via
calvin
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
17
Capability Hardware Enhanced RISC Instructions (CHERI)
hardware
cl.cam.ac.uk
via
quad
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
15 comments
15
10
Formal verification of IA-64 division algorithms (2000)
pdf
formalmethods
cl.cam.ac.uk
via
calvin
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
13
How much is a mechanized proof worth, certification-wise?
pdf
slides
formalmethods
cl.cam.ac.uk
via
edoput
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
4
Young Persons Guide to BCPL Programming on the Raspberry Pi
pdf
plt
cl.cam.ac.uk
via
idrougge
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
5 comments
5
4
Breaking copy protection in microcontrollers (2001)
hardware
security
cl.cam.ac.uk
via
calvin
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
Security Engineering - A Guide to BuildingDependable Distributed Systems
book
pdf
cryptography
security
cl.cam.ac.uk
via
xfbs
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
7
REMS - Rigorous Engineering of Mainstream Systems
c++
compsci
formalmethods
networking
osdev
cl.cam.ac.uk
via
animatronic
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
5
Corecursion and coinduction: what they are and how they relate to recursion and induction
pdf
compsci
cl.cam.ac.uk
via
calvin
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
8
Identifying Unintended Harms of Cybersecurity Countermeasures (2019)
pdf
security
cl.cam.ac.uk
via
mooreds
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
CHERI: The Arm Morello Board
formalmethods
hardware
security
cl.cam.ac.uk
via
indolering
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
2
ARMv8-A system semantics: instruction fetch in relaxed architectures
hardware
cl.cam.ac.uk
via
eatonphil
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
6
CheriABI: Enforcing Valid Pointer Provenance and Minimizing Pointer Privilege
☶
pdf
security
cl.cam.ac.uk
via
lattera
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
4
ISA Semantics for ARMv8-A, RISC-V, and CHERI-MIPS
☶
pdf
formalmethods
cl.cam.ac.uk
via
GeoffWozniak
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
4
Kiwi: High-Level Synthesis for Accelerating Scientific Computation
☶
compilers
dotnet
hardware
performance
cl.cam.ac.uk
via
nickpsecurity
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
Mathematizing C++ Concurrency
plt
cl.cam.ac.uk
via
davidk01
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
Stephen Kell, "The Mythical Matched Modules" (2009)
pdf
practices
programming
cl.cam.ac.uk
via
akkartik
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
Efficient, Tagged Memory (2017)
☶
pdf
hardware
programming
security
cl.cam.ac.uk
via
nickpsecurity
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
CheriRTOS: A Capability Model for Embedded Devices
☶
pdf
hardware
security
cl.cam.ac.uk
via
nickpsecurity
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
Algebraic Principles for Program Correctness Tools in Isabelle HOL (2016)
☶
pdf
formalmethods
programming
cl.cam.ac.uk
via
nickpsecurity
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
28
Some Were Meant For C
pdf
c
philosophy
cl.cam.ac.uk
via
friendlysock
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
55 comments
55
5
ASAP: As Static As Possible Memory Management (2017)
☶
pdf
c
compilers
plt
security
cl.cam.ac.uk
via
nickpsecurity
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
1
Making Bitcoin Legal
☶
pdf
finance
law
merkle-trees
cl.cam.ac.uk
via
calvin
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
Page 2 >>