A Survey on Thwarting Memory Corruption in RISC-V

M Brohet, F Regazzoni - ACM Computing Surveys, 2023 - dl.acm.org
With embedded devices becoming more pervasive and entrenched in society, it is
paramount to keep these systems secure. A threat plaguing these systems consists of …

ISA semantics for ARMv8-a, RISC-v, and CHERI-MIPS

A Armstrong, T Bauereiss, B Campbell, A Reid… - Proceedings of the …, 2019 - dl.acm.org
Architecture specifications notionally define the fundamental interface between hardware
and software: the envelope of allowed behaviour for processor implementations, and the …

Cornucopia: Temporal safety for CHERI heaps

NW Filardo, BF Gutstein, J Woodruff… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Use-after-free violations of temporal memory safety continue to plague software systems,
underpinning many high-impact exploits. The CHERI capability system shows great promise …

A survey on risc-v security: Hardware and architecture

T Lu - arxiv preprint arxiv:2107.04175, 2021 - arxiv.org
The Internet of Things (IoT) is an ongoing technological revolution. Embedded processors
are the processing engines of smart IoT devices. For decades, these processors were …

CheriABI: Enforcing valid pointer provenance and minimizing pointer privilege in the POSIX C run-time environment

B Davis, RNM Watson, A Richardson… - Proceedings of the …, 2019 - dl.acm.org
The CHERI architecture allows pointers to be implemented as capabilities (rather than
integer virtual addresses) in a manner that is compatible with, and strengthens, the …

Flexos: Towards flexible os isolation

H Lefeuvre, VA Bădoiu, A Jung… - Proceedings of the 27th …, 2022 - dl.acm.org
At design time, modern operating systems are locked in a specific safety and isolation
strategy that mixes one or more hardware/software protection mechanisms (eg user/kernel …

{MTSan}: A Feasible and Practical Memory Sanitizer for Fuzzing {COTS} Binaries

X Chen, Y Shi, Z Jiang, Y Li, R Wang, H Duan… - 32nd USENIX Security …, 2023 - usenix.org
Fuzzing has been widely adopted for finding vulnerabilities in programs, especially when
source code is not available. But the effectiveness and efficiency of binary fuzzing are …

An introduction to CHERI

RNM Watson, SW Moore, P Sewell, PG Neumann - 2019 - cl.cam.ac.uk
Abstract CHERI (Capability Hardware Enhanced RISC Instructions) extends conventional
processor Instruction-Set Architectures (ISAs) with architectural capabilities to enable fine …

Exploring C semantics and pointer provenance

K Memarian, VBF Gomes, B Davis, S Kell… - Proceedings of the …, 2019 - dl.acm.org
The semantics of pointers and memory objects in C has been a vexed question for many
years. C values cannot be treated as either purely abstract or purely concrete entities: the …

Rigorous engineering for hardware security: Formal modelling and proof in the CHERI design and implementation process

K Nienhuis, A Joannou, T Bauereiss… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
The root causes of many security vulnerabilities include a pernicious combination of two
problems, often regarded as inescapable aspects of computing. First, the protection …