Search For:

Displaying 1-10 out of 10 total
The CHERI capability model: Revisiting RISC in an age of risk
Found in: 2014 ACM/IEEE 41st International Symposium on Computer Architecture (ISCA)
By Jonathan Woodruff,Robert N. M. Watson,David Chisnall,Simon W. Moore,Jonathan Anderson,Brooks Davis,Ben Laurie,Peter G. Neumann,Robert Norton,Michael Roe
Issue Date:June 2014
pp. 457-468
Motivated by contemporary security challenges, we reevaluate and refine capability-based addressing for the RISC era. We present CHERI, a hybrid capability model that extends the 64-bit MIPS ISA with byte-granularity memory protection. We demonstrate that ...
   
Must social networking conflict with privacy?
Found in: IEEE Security & Privacy
By Jonathan Anderson,Frank Stajano
Issue Date:May 2013
pp. 51-60
Online social networks have serious privacy drawbacks, some of which stem from the business model. Must this be? Is the current OSN business model the only viable one? Or can we construct alternatives that are technically and economically feasible?
 
Prying Data out of a Social Network
Found in: Social Network Analysis and Mining, International Conference on Advances in
By Joseph Bonneau, Jonathan Anderson, George Danezis
Issue Date:July 2009
pp. 249-254
Preventing adversaries from compiling significant amounts of user data is a major challenge for social network operators. We examine the difficulty of collecting profile and graph information from the popular social networking website Facebook and report t...
 
Recovering from Distributable Thread Failures with Assured Timeliness in Real-Time Distributed Systems
Found in: Reliable Distributed Systems, IEEE Symposium on
By Edward Curley, Jonathan Anderson, Binoy Ravindran, E. D. Jensen
Issue Date:October 2006
pp. 267-276
We consider the problem of recovering from failures of distributable threads with assured timeliness. When a node hosting a portion of a distributable thread fails, it causes orphans-i.e., thread segments that are disconnected from the thread?s root. We co...
   
A taste of Capsicum: practical capabilities for UNIX
Found in: Communications of the ACM
By Ben Laurie, Robert N. M. Watson, Robert N. M. Watson, Ben Laurie, Jonathan Anderson, Jonathan Anderson, Kris Kennaway, Kris Kennaway
Issue Date:March 2012
pp. 97-104
Capsicum is a lightweight operating system (OS) capability and sandbox framework planned for inclusion in FreeBSD 9. Capsicum extends, rather than replaces, UNIX APIs, providing new kernel primitives (sandboxed capability mode and capabilities) and a users...
     
Eight friends are enough: social graph approximation via public listings
Found in: Proceedings of the Second ACM EuroSys Workshop on Social Network Systems (SNS '09)
By Frank Stajano, Jonathan Anderson, Joseph Bonneau, Ross Anderson
Issue Date:March 2009
pp. 13-18
The popular social networking website Facebook exposes a "public view" of user profiles to search engines which includes eight of the user's friendship links. We examine what interesting properties of the complete social graph can be inferred from this pub...
     
Recovering from distributable thread failures in distributed real-time Java
Found in: ACM Transactions on Embedded Computing Systems (TECS)
By Binoy Ravindran, E. Douglas Jensen, Edward Curley, Jonathan Anderson
Issue Date:August 2010
pp. 1-37
We consider the problem of recovering from the failures of distributable threads (“threads”) in distributed real-time systems that operate under runtime uncertainties including those on thread execution times, thread arrivals, and node failure ...
     
Privacy-enabling social networking over untrusted networks
Found in: Proceedings of the 2nd ACM workshop on Online social networks (WOSN '09)
By Claudia Diaz, Frank Stajano, Jonathan Anderson, Joseph Bonneau
Issue Date:August 2009
pp. 101-104
Current social networks require users to place absolute faith in their operators, and the inability of operators to protect users from malicious agents has led to sensitive private information being made public. We propose an architecture for social networ...
     
Privacy suites: shared privacy for social networks
Found in: Proceedings of the 5th Symposium on Usable Privacy and Security (SOUPS '09)
By Jonathan Anderson, Joseph Bonneau, Luke Church
Issue Date:July 2009
pp. 1-32
Existing technologies for file sharing differ widely in the granularity of control they give users over who can access their data; achieving finer-grained control generally requires more user effort. We want to understand what level of control users need o...
     
Privacy stories: confidence in privacy behaviors through end user programming
Found in: Proceedings of the 5th Symposium on Usable Privacy and Security (SOUPS '09)
By Frank Stajano, Joesph Bonneau, Jonathan Anderson, Luke Church
Issue Date:July 2009
pp. 1-32
Existing technologies for file sharing differ widely in the granularity of control they give users over who can access their data; achieving finer-grained control generally requires more user effort. We want to understand what level of control users need o...
     
 1