Capability hardware enhanced RISC instructions: CHERI instruction-set architecture (version 7)
RNM Watson, PG Neumann, J Woodruff, M Roe… - 2019 - cl.cam.ac.uk
This technical report describes CHERI ISAv7, the seventh version of the Capability
Hardware Enhanced RISC Instructions (CHERI) Instruction-Set Architecture (ISA) being …
Hardware Enhanced RISC Instructions (CHERI) Instruction-Set Architecture (ISA) being …
Clean application compartmentalization with SOAAP
K Gudka, RNM Watson, J Anderson… - Proceedings of the …, 2015 - dl.acm.org
Application compartmentalization, a vulnerability mitigation technique employed in
programs such as OpenSSH and the Chromium web browser, decomposes software into …
programs such as OpenSSH and the Chromium web browser, decomposes software into …
Complete spatial safety for C and C++ using CHERI capabilities
A Richardson - 2020 - cl.cam.ac.uk
Lack of memory safety in commonly used systems-level languages such as C and C++
results in a constant stream of new exploitable software vulnerabilities and exploit …
results in a constant stream of new exploitable software vulnerabilities and exploit …
Capability hardware enhanced RISC instructions: CHERI instruction-set architecture
RNM Watson, PG Neumann, J Woodruff, M Roe… - 2015 - cl.cam.ac.uk
This technical report describes CHERI ISAv4, the fourth version of the Capability Hardware
Enhanced RISC Instructions (CHERI) Instruction-Set Architecture (ISA). CHERI is being …
Enhanced RISC Instructions (CHERI) Instruction-Set Architecture (ISA). CHERI is being …
Capability Hardware Enhanced RISC Instructions: CHERI Programmer's Guide
Capability Hardware Enhanced RISC Instructions: CHERI Programmer's Guide Page 1
Technical Report Number 877 Computer Laboratory UCAM-CL-TR-877 ISSN 1476-2986 …
Technical Report Number 877 Computer Laboratory UCAM-CL-TR-877 ISSN 1476-2986 …
Digital Security by Design: A Review of Combined Hardware-Software-Based CyberSecurity with Compartmentalization
Compartmentalization serves as a cornerstone for fortified hardware and software security.
This technique encompasses memory isolation, trusted execution environments, and …
This technique encompasses memory isolation, trusted execution environments, and …
CRASH-worthy Trustworthy Systems R&D (CTSRD): CHERI System Architecture and Research
PG Neumann, RNM Watson, SW Moore - 2019 - apps.dtic.mil
This is the Final Technical Report for CRASH-worthy Trustworthy Systems Research and
Development CTSRD, SRI Project 19800, sponsored by the Defense Advanced Research …
Development CTSRD, SRI Project 19800, sponsored by the Defense Advanced Research …