default search action
A. Theodore Markettos
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j5]Samuel W. Stark, A. Theodore Markettos, Simon W. Moore:
How Flexible Is CXL's Memory Protection? Commun. ACM 66(12): 46-51 (2023) - [j4]Samuel W. Stark, A. Theodore Markettos, Simon W. Moore:
How Flexible is CXL's Memory Protection?: Replacing a sledgehammer with a scalpel. ACM Queue 21(3): 54-64 (2023) - 2021
- [c18]Matthew Naylor, Simon W. Moore, David B. Thomas, Jonathan R. Beaumont, Shane T. Fleming, Mark Vousden, A. Theodore Markettos, Thomas Bytheway, Andrew D. Brown:
General hardware multicasting for fine-grained message-passing architectures. PDP 2021: 126-133 - 2020
- [c17]Matthew Naylor, Simon W. Moore, Andrey Mokhov, David B. Thomas, Jonathan R. Beaumont, Shane T. Fleming, A. Theodore Markettos, Thomas Bytheway, Andrew D. Brown:
Termination detection for fine-grained message-passing architectures. ASAP 2020: 17-24 - [c16]A. Theodore Markettos, John Baldwin, Ruslan Bukin, Peter G. Neumann, Simon W. Moore, Robert N. M. Watson:
Position Paper: Defending Direct Memory Access with CHERI Capabilities. HASP@MICRO 2020: 7:1-7:9 - [c15]Nathaniel Wesley Filardo, Brett F. Gutstein, Jonathan Woodruff, Sam Ainsworth, Lucian Paul-Trifu, Brooks Davis, Hongyan Xia, Edward Tomasz Napierala, Alexander Richardson, John Baldwin, David Chisnall, Jessica Clarke, Khilan Gudka, Alexandre Joannou, A. Theodore Markettos, Alfredo Mazzinghi, Robert M. Norton, Michael Roe, Peter Sewell, Stacey D. Son, Timothy M. Jones, Simon W. Moore, Peter G. Neumann, Robert N. M. Watson:
Cornucopia: Temporal Safety for CHERI Heaps. SP 2020: 608-625
2010 – 2019
- 2019
- [j3]A. Theodore Markettos, Robert N. M. Watson, Simon W. Moore, Peter Sewell, Peter G. Neumann:
Through computer architecture, darkly. Commun. ACM 62(6): 25-27 (2019) - [j2]Jonathan Woodruff, Alexandre Joannou, Hongyan Xia, Anthony C. J. Fox, Robert M. Norton, David Chisnall, Brooks Davis, Khilan Gudka, Nathaniel Wesley Filardo, A. Theodore Markettos, Michael Roe, Peter G. Neumann, Robert N. M. Watson, Simon W. Moore:
CHERI Concentrate: Practical Compressed Capabilities. IEEE Trans. Computers 68(10): 1455-1469 (2019) - [c14]Brooks Davis, Robert N. M. Watson, Alexander Richardson, Peter G. Neumann, Simon W. Moore, John Baldwin, David Chisnall, Jessica Clarke, Nathaniel Wesley Filardo, Khilan Gudka, Alexandre Joannou, Ben Laurie, A. Theodore Markettos, J. Edward Maste, Alfredo Mazzinghi, Edward Tomasz Napierala, Robert M. Norton, Michael Roe, Peter Sewell, Stacey D. Son, Jonathan Woodruff:
CheriABI: Enforcing Valid Pointer Provenance and Minimizing Pointer Privilege in the POSIX C Run-time Environment. ASPLOS 2019: 379-393 - [c13]A. Theodore Markettos, Colin Rothwell, Brett F. Gutstein, Allison Pearce, Peter G. Neumann, Simon W. Moore, Robert N. M. Watson:
Thunderclap: Exploring Vulnerabilities in Operating System IOMMU Protection via DMA from Untrustworthy Peripherals. NDSS 2019 - 2017
- [c12]David Chisnall, Brooks Davis, Khilan Gudka, David Brazdil, Alexandre Joannou, Jonathan Woodruff, A. Theodore Markettos, J. Edward Maste, Robert M. Norton, Stacey D. Son, Michael Roe, Simon W. Moore, Peter G. Neumann, Ben Laurie, Robert N. M. Watson:
CHERI JNI: Sinking the Java Security Model into the C. ASPLOS 2017: 569-583 - [c11]Alexandre Joannou, Jonathan Woodruff, Robert Kovacsics, Simon W. Moore, Alex Bradbury, Hongyan Xia, Robert N. M. Watson, David Chisnall, Michael Roe, Brooks Davis, Edward Napierala, John Baldwin, Khilan Gudka, Peter G. Neumann, Alfredo Mazzinghi, Alex Richardson, Stacey D. Son, A. Theodore Markettos:
Efficient Tagged Memory. ICCD 2017: 641-648 - 2016
- [j1]Robert N. M. Watson, Robert M. Norton, Jonathan Woodruff, Simon W. Moore, Peter G. Neumann, Jonathan Anderson, David Chisnall, Brooks Davis, Ben Laurie, Michael Roe, Nirav H. Dave, Khilan Gudka, Alexandre Joannou, A. Theodore Markettos, Ed Maste, Steven J. Murdoch, Colin Rothwell, Stacey D. Son, Munraj Vadera:
Fast Protection-Domain Crossing in the CHERI Capability-System Architecture. IEEE Micro 36(5): 38-49 (2016) - [c10]A. Theodore Markettos, Simon W. Moore, Brian D. Jones, Roy Spliet, Vlad A. Gavrila:
Conquering the complexity mountain: Full-stack computer architecture teaching with FPGAs. EWME 2016: 1-6 - 2014
- [c9]A. Theodore Markettos, Paul James Fox, Simon W. Moore, Andrew W. Moore:
Interconnect for commodity FPGA clusters: Standardized or customized? FPL 2014: 1-8 - [c8]Paul James Fox, A. Theodore Markettos, Simon W. Moore:
Reliably prototyping large SoCs using FPGA clusters. ReCoSoC 2014: 1-8 - 2013
- [c7]Matthew Naylor, Paul James Fox, A. Theodore Markettos, Simon W. Moore:
A spiking neural network on a portable FPGA tablet. FPL 2013: 1 - [c6]Matthew Naylor, Paul James Fox, A. Theodore Markettos, Simon W. Moore:
Managing the FPGA memory wall: Custom computing or vector processing? FPL 2013: 1-6 - [c5]Jonathan Woodruff, A. Theodore Markettos, Simon W. Moore:
A 64-bit MIPS processor running freebsd on a portable FPGA tablet. FPL 2013: 1 - 2012
- [c4]Simon W. Moore, Paul James Fox, Steven J. T. Marsh, A. Theodore Markettos, Alan Mujumdar:
Bluehive - A Field-Programable Custom Computing Machine for Extreme-Scale Real-Time Neural Network Simulation. FCCM 2012: 133-140 - 2011
- [b1]Athanasios Theodore Markettos:
Active electromagnetic attacks on secure hardware. University of Cambridge, UK, 2011
2000 – 2009
- 2009
- [c3]A. Theodore Markettos, Simon W. Moore:
The Frequency Injection Attack on Ring-Oscillator-Based True Random Number Generators. CHES 2009: 317-331 - 2005
- [c2]Huiyun Li, A. Theodore Markettos, Simon W. Moore:
Security Evaluation Against Electromagnetic Analysis at Design Time. CHES 2005: 280-292 - [c1]Huiyun Li, A. Theodore Markettos, Simon W. Moore:
Security evaluation against electromagnetic analysis at design time. HLDVT 2005: 211-218
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-24 20:39 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint