default search action
Peter G. Neumann
Person information
- affiliation: SRI International, Menlo Park, California, USA
- award (1996): EFF Pioneer Award
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j320]Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Vanessa Teague, Carmela Troncoso:
Bugs in our pockets: the risks of client-side scanning. J. Cybersecur. 10(1) (2024) - [j319]Alexandre Joannou, Peter Rugg, Jonathan Woodruff, Franz A. Fuchs, Marno van der Maas, Matthew Naylor, Michael Roe, Robert N. M. Watson, Peter G. Neumann, Simon W. Moore:
Randomized Testing of RISC-V CPUs Using Direct Instruction Injection. IEEE Des. Test 41(1): 40-49 (2024) - [j318]Robert N. M. Watson, David Chisnall, Jessica Clarke, Brooks Davis, Nathaniel Wesley Filardo, Ben Laurie, Simon W. Moore, Peter G. Neumann, Alexander Richardson, Peter Sewell, Konrad Witaszczyk, Jonathan Woodruff:
CHERI: Hardware-Enabled C/C++ Memory Protection at Scale. IEEE Secur. Priv. 22(4): 50-61 (2024) - [j317]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 49(1): 4-9 (2024) - [j316]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 49(2): 3-8 (2024) - [j315]Peter G. Neumann:
ACM Risks Forum Quarterly Summary. ACM SIGSOFT Softw. Eng. Notes 49(3): 3-12 (2024) - [c48]Nathaniel Wesley Filardo, Brett F. Gutstein, Jonathan Woodruff, Jessica Clarke, Peter Rugg, Brooks Davis, Mark Johnston, Robert M. Norton, David Chisnall, Simon W. Moore, Peter G. Neumann, Robert N. M. Watson:
Cornucopia Reloaded: Load Barriers for CHERI Heap Temporal Safety. ASPLOS (2) 2024: 251-268 - 2023
- [j314]Peter G. Neumann:
Computer-Related Risks and Remediation Challenges. Commun. ACM 66(6): 28-30 (2023) - [j313]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 48(1): 7-12 (2023) - [j312]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 48(2): 4-8 (2023) - [j311]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 48(3): 4-7 (2023) - [j310]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 48(4): 8-12 (2023) - [c47]Franz A. Fuchs, Jonathan Woodruff, Peter Rugg, Marno van der Maas, Alexandre Joannou, Alexander Richardson, Jessica Clarke, Nathaniel Wesley Filardo, Brooks Davis, John Baldwin, Peter G. Neumann, Simon W. Moore, Robert N. M. Watson:
Architectural Contracts for Safe Speculation. ICCD 2023: 578-586 - 2022
- [j309]Peter G. Neumann:
Toward total-system trustworthiness. Commun. ACM 65(6): 32-35 (2022) - [j308]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 47(1): 5-7 (2022) - [j307]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 47(2): 4-7 (2022) - [j306]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 47(3): 5-10 (2022) - [j305]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 47(4): 9-15 (2022) - [i3]Hesham Almatary, Michael Dodson, Jessica Clarke, Peter Rugg, Ivan Gomes, Michal Podhradsky, Peter G. Neumann, Simon W. Moore, Robert N. M. Watson:
CompartOS: CHERI Compartmentalization for Embedded Systems. CoRR abs/2206.02852 (2022) - 2021
- [j304]Rebecca T. Mercuri, Peter G. Neumann:
The risks of election believability (or lack thereof). Commun. ACM 64(6): 24-30 (2021) - [j303]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 46(1): 13-18 (2021) - [j302]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 46(2): 11-15 (2021) - [j301]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 46(3): 8-13 (2021) - [j300]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 46(4): 8-13 (2021) - [i2]Hal Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Vanessa Teague, Carmela Troncoso:
Bugs in our Pockets: The Risks of Client-Side Scanning. CoRR abs/2110.07450 (2021) - 2020
- [j299]Peter G. Neumann:
A holistic view of future risks. Commun. ACM 63(10): 23-27 (2020) - [j298]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 45(1): 6-11 (2020) - [j297]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 45(2): 7-12 (2020) - [j296]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 45(3): 6-11 (2020) - [j295]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 45(4): 11-16 (2020) - [c46]A. Theodore Markettos, John Baldwin, Ruslan Bukin, Peter G. Neumann, Simon W. Moore, Robert N. M. Watson:
Position Paper: Defending Direct Memory Access with CHERI Capabilities. HASP@MICRO 2020: 7:1-7:9 - [c45]Nathaniel Wesley Filardo, Brett F. Gutstein, Jonathan Woodruff, Sam Ainsworth, Lucian Paul-Trifu, Brooks Davis, Hongyan Xia, Edward Tomasz Napierala, Alexander Richardson, John Baldwin, David Chisnall, Jessica Clarke, Khilan Gudka, Alexandre Joannou, A. Theodore Markettos, Alfredo Mazzinghi, Robert M. Norton, Michael Roe, Peter Sewell, Stacey D. Son, Timothy M. Jones, Simon W. Moore, Peter G. Neumann, Robert N. M. Watson:
Cornucopia: Temporal Safety for CHERI Heaps. SP 2020: 608-625 - [c44]Kyndylan Nienhuis, Alexandre Joannou, Thomas Bauereiss, Anthony C. J. Fox, Michael Roe, Brian Campbell, Matthew Naylor, Robert M. Norton, Simon W. Moore, Peter G. Neumann, Ian Stark, Robert N. M. Watson, Peter Sewell:
Rigorous engineering for hardware security: Formal modelling and proof in the CHERI design and implementation process. SP 2020: 1003-1020
2010 – 2019
- 2019
- [j294]A. Theodore Markettos, Robert N. M. Watson, Simon W. Moore, Peter Sewell, Peter G. Neumann:
Through computer architecture, darkly. Commun. ACM 62(6): 25-27 (2019) - [j293]Peter G. Neumann:
How might we increase system trustworthiness? Commun. ACM 62(10): 23-25 (2019) - [j292]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 44(1): 11-17 (2019) - [j291]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 44(2): 6-12 (2019) - [j290]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 44(3): 16-21 (2019) - [j289]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 44(4): 5-10 (2019) - [j288]Jonathan Woodruff, Alexandre Joannou, Hongyan Xia, Anthony C. J. Fox, Robert M. Norton, David Chisnall, Brooks Davis, Khilan Gudka, Nathaniel Wesley Filardo, A. Theodore Markettos, Michael Roe, Peter G. Neumann, Robert N. M. Watson, Simon W. Moore:
CHERI Concentrate: Practical Compressed Capabilities. IEEE Trans. Computers 68(10): 1455-1469 (2019) - [c43]Brooks Davis, Robert N. M. Watson, Alexander Richardson, Peter G. Neumann, Simon W. Moore, John Baldwin, David Chisnall, Jessica Clarke, Nathaniel Wesley Filardo, Khilan Gudka, Alexandre Joannou, Ben Laurie, A. Theodore Markettos, J. Edward Maste, Alfredo Mazzinghi, Edward Tomasz Napierala, Robert M. Norton, Michael Roe, Peter Sewell, Stacey D. Son, Jonathan Woodruff:
CheriABI: Enforcing Valid Pointer Provenance and Minimizing Pointer Privilege in the POSIX C Run-time Environment. ASPLOS 2019: 379-393 - [c42]Hongyan Xia, Jonathan Woodruff, Sam Ainsworth, Nathaniel Wesley Filardo, Michael Roe, Alexander Richardson, Peter Rugg, Peter G. Neumann, Simon W. Moore, Robert N. M. Watson, Timothy M. Jones:
CHERIvoke: Characterising Pointer Revocation using CHERI Capabilities for Temporal Memory Safety. MICRO 2019: 545-557 - [c41]A. Theodore Markettos, Colin Rothwell, Brett F. Gutstein, Allison Pearce, Peter G. Neumann, Simon W. Moore, Robert N. M. Watson:
Thunderclap: Exploring Vulnerabilities in Operating System IOMMU Protection via DMA from Untrustworthy Peripherals. NDSS 2019 - 2018
- [j287]Steven M. Bellovin, Peter G. Neumann:
The big picture. Commun. ACM 61(11): 24-26 (2018) - [j286]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 43(1): 1-6 (2018) - [j285]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 43(2): 8-11 (2018) - [j284]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 43(3): 11-16 (2018) - [j283]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 43(4): 13-20 (2018) - [c40]Hongyan Xia, Jonathan Woodruff, Hadrien Barral, Lawrence Esswood, Alexandre Joannou, Robert Kovacsics, David Chisnall, Michael Roe, Brooks Davis, Edward Napierala, John Baldwin, Khilan Gudka, Peter G. Neumann, Alexander Richardson, Simon W. Moore, Robert N. M. Watson:
CheriRTOS: A Capability Model for Embedded Devices. ICCD 2018: 92-99 - 2017
- [j282]Ulf Lindqvist, Peter G. Neumann:
The future of the internet of things. Commun. ACM 60(2): 26-30 (2017) - [j281]Peter G. Neumann:
Trustworthiness and truthfulness are essential. Commun. ACM 60(6): 26-28 (2017) - [j280]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 42(1): 9-16 (2017) - [j279]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 42(2): 7-14 (2017) - [j278]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 42(3): 10-17 (2017) - [j277]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 42(4): 10-17 (2017) - [c39]David Chisnall, Brooks Davis, Khilan Gudka, David Brazdil, Alexandre Joannou, Jonathan Woodruff, A. Theodore Markettos, J. Edward Maste, Robert M. Norton, Stacey D. Son, Michael Roe, Simon W. Moore, Peter G. Neumann, Ben Laurie, Robert N. M. Watson:
CHERI JNI: Sinking the Java Security Model into the C. ASPLOS 2017: 569-583 - [c38]Alexandre Joannou, Jonathan Woodruff, Robert Kovacsics, Simon W. Moore, Alex Bradbury, Hongyan Xia, Robert N. M. Watson, David Chisnall, Michael Roe, Brooks Davis, Edward Napierala, John Baldwin, Khilan Gudka, Peter G. Neumann, Alfredo Mazzinghi, Alex Richardson, Stacey D. Son, A. Theodore Markettos:
Efficient Tagged Memory. ICCD 2017: 641-648 - 2016
- [j276]Rebecca T. Mercuri, Peter G. Neumann:
The risks of self-auditing systems. Commun. ACM 59(6): 22-25 (2016) - [j275]Peter G. Neumann:
Risks of automation: a cautionary total-system perspective of our cyberfuture. Commun. ACM 59(10): 26-30 (2016) - [j274]Robert N. M. Watson, Robert M. Norton, Jonathan Woodruff, Simon W. Moore, Peter G. Neumann, Jonathan Anderson, David Chisnall, Brooks Davis, Ben Laurie, Michael Roe, Nirav H. Dave, Khilan Gudka, Alexandre Joannou, A. Theodore Markettos, Ed Maste, Steven J. Murdoch, Colin Rothwell, Stacey D. Son, Munraj Vadera:
Fast Protection-Domain Crossing in the CHERI Capability-System Architecture. IEEE Micro 36(5): 38-49 (2016) - [j273]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 41(1): 18-24 (2016) - [j272]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 41(2): 16-22 (2016) - [j271]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 41(3): 19-26 (2016) - [j270]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 41(4): 18-24 (2016) - [j269]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 41(5): 19-26 (2016) - [j268]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 41(6): 16-23 (2016) - [j267]Peter G. Neumann:
Automated Car Woes - Whoa There! Ubiquity 2016(July): 1:1-1:6 (2016) - [i1]Robert N. M. Watson, Simon W. Moore, Peter G. Neumann:
CHERI: A Hardware-Software System to Support the Principle of Least Privilege. ERCIM News 2016(106) (2016) - 2015
- [j266]Peter G. Neumann:
Far-sighted thinking about deleterious computer-related events. Commun. ACM 58(2): 30-33 (2015) - [j265]Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, Daniel J. Weitzner:
Keys under doormats. Commun. ACM 58(10): 24-26 (2015) - [j264]Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, Daniel J. Weitzner:
Keys under doormats: mandating insecurity by requiring government access to all data and communications. J. Cybersecur. 1(1): 69-79 (2015) - [j263]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 40(1): 19-26 (2015) - [j262]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 40(2): 16-21 (2015) - [j261]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 40(3): 17-22 (2015) - [j260]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 40(4): 15-20 (2015) - [j259]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 40(5): 15-25 (2015) - [j258]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 40(6): 14-19 (2015) - [c37]Jong Hun Han, Prashanth Mundkur, Charalampos Rotsos, Gianni Antichi, Nirav H. Dave, Andrew William Moore, Peter G. Neumann:
Blueswitch: Enabling Provably Consistent Configuration of Network Switches. ANCS 2015: 17-27 - [c36]David Chisnall, Colin Rothwell, Robert N. M. Watson, Jonathan Woodruff, Munraj Vadera, Simon W. Moore, Michael Roe, Brooks Davis, Peter G. Neumann:
Beyond the PDP-11: Architectural Support for a Memory-Safe C Abstract Machine. ASPLOS 2015: 117-130 - [c35]Khilan Gudka, Robert N. M. Watson, Jonathan Anderson, David Chisnall, Brooks Davis, Ben Laurie, Ilias Marinos, Peter G. Neumann, Alex Richardson:
Clean Application Compartmentalization with SOAAP. CCS 2015: 1016-1031 - [c34]Peter G. Neumann:
Reminiscences on SOSP history day. SOSP History Day 2015: 14:1-14:9 - [c33]Robert N. M. Watson, Jonathan Woodruff, Peter G. Neumann, Simon W. Moore, Jonathan Anderson, David Chisnall, Nirav H. Dave, Brooks Davis, Khilan Gudka, Ben Laurie, Steven J. Murdoch, Robert M. Norton, Michael Roe, Stacey D. Son, Munraj Vadera:
CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization. IEEE Symposium on Security and Privacy 2015: 20-37 - 2014
- [j257]Peter G. Neumann:
Risks and myths of cloud computing and cloud storage. Commun. ACM 57(10): 25-27 (2014) - [j256]Peter G. Neumann, Sean Peisert, Marvin Schaefer:
The IEEE Symposium on Security and Privacy, in Retrospect. IEEE Secur. Priv. 12(3): 15-17 (2014) - [j255]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 39(1): 17-23 (2014) - [j254]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 39(2): 25-30 (2014) - [j253]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 39(3): 18-22 (2014) - [j252]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 39(4): 24-32 (2014) - [j251]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 39(5): 3:14-3:21 (2014) - [j250]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 39(6): 17-22 (2014) - [c32]Jonathan Woodruff, Robert N. M. Watson, David Chisnall, Simon W. Moore, Jonathan Anderson, Brooks Davis, Ben Laurie, Peter G. Neumann, Robert M. Norton, Michael Roe:
The CHERI capability model: Revisiting RISC in an age of risk. ISCA 2014: 457-468 - 2013
- [j249]Peter G. Neumann:
More sight on foresight. Commun. ACM 56(2): 23-25 (2013) - [j248]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 38(1): 20-26 (2013) - [j247]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 38(2): 20-25 (2013) - [j246]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 38(3): 21-28 (2013) - [j245]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 38(4): 19-24 (2013) - [j244]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 38(5): 28-33 (2013) - [j243]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 38(6): 21-28 (2013) - [c31]Robert N. M. Watson, Steven J. Murdoch, Khilan Gudka, Jonathan Anderson, Peter G. Neumann, Ben Laurie:
Towards a Theory of Application Compartmentalisation. Security Protocols Workshop 2013: 19-27 - 2012
- [j242]Peter G. Neumann:
The foresight saga, redux. Commun. ACM 55(10): 26-29 (2012) - [j241]Peter G. Neumann, Ulf Lindqvist:
The IEEE Symposium on Security and Privacy Is Moving to San Francisco. IEEE Secur. Priv. 10(2): 65-66 (2012) - [j240]Dan Thomsen, Jeremy Epstein, Peter G. Neumann:
Lost Treasures. IEEE Secur. Priv. 10(6): 17-19 (2012) - [j239]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 37(1): 21-26 (2012) - [j238]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 37(2): 21-29 (2012) - [j237]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 37(3): 18-25 (2012) - [j236]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 37(4): 20-29 (2012) - [j235]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 37(5): 27-33 (2012) - [j234]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 37(6): 19-23 (2012) - 2011
- [j233]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 36(1): 19-27 (2011) - [j232]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 36(2): 19-27 (2011) - [j231]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 36(3): 19-25 (2011) - [j230]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 36(4): 17-23 (2011) - [j229]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 36(5): 20-23 (2011) - [j228]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 36(6): 19-23 (2011) - [c30]Peter G. Neumann:
Carrying Goals to Newcastle: A Tribute to Brian Randell. Dependable and Historic Computing 2011: 387-392 - 2010
- [j227]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 35(1): 21-30 (2010) - [j226]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 35(2): 15-24 (2010) - [j225]