Capability Hardware Enhanced RISC Instructions (CHERI) extend conventional ISAs with capabilities that can enable fine-grained memory protection and scalable software compartmentalisation. CHERI-RISC-V is an extended version of the RISC-V ISA with support for CHERI, and Flute is an open-source 64-bit RISC-V processor with a five-stage, in-order pipeline. This case study presents the formal verification of CHERI-Flute, a modified version of Flute that implements CHERI-RISC-V, against the Sail CHERI-RISC-V specification. To the best of our knowledge, this is the first extensive formal verification of a CHERI-enabled processor. We first translated relevant portions of the Sail CHERIRISC-V specification to SystemVerilog Assertions. Then we form...
We study the applicability of the logic of Positive Equality with Uninterpreted Functions (PEUF) [2...
By abstracting the details of the data representations and operations in a microprocessor, term-leve...
Embedded systems are deployed ubiquitously among various sectors including automotive, medical, robo...
CHERI-C extends the C programming language by adding hardware capabilities, ensuring a certain degre...
Vulnerabilities in computer systems arise in part due to programmer's logical errors, and in part al...
RISC-V is an open, free standard architecture. As its open-source architecture, it can be used in mu...
Memory safety issues are a persistent source of security vulnerabilities, with conventional architec...
Architecture specifications notionally define the fundamental interface between hardware and softwar...
The root causes of many security vulnerabilities include a pernicious combination of two problems, o...
In this paper a practical methodology for formally verifying RISC cores is presented. This methodolo...
Capability Hardware Enhanced RISC Instructions (CHERI) supplement the conventional memory management...
The instruction set architecture (ISA) specifies a contract between hardware and software; it covers...
The Verification methodology of modern processor designs is an enormous challenge. As processor desi...
The topic of this master thesis is Formal verification of RISC-V processor with Questa PropCheck usi...
The paper presents a sequence of three projects on design and formal verification of pipelined and s...
We study the applicability of the logic of Positive Equality with Uninterpreted Functions (PEUF) [2...
By abstracting the details of the data representations and operations in a microprocessor, term-leve...
Embedded systems are deployed ubiquitously among various sectors including automotive, medical, robo...
CHERI-C extends the C programming language by adding hardware capabilities, ensuring a certain degre...
Vulnerabilities in computer systems arise in part due to programmer's logical errors, and in part al...
RISC-V is an open, free standard architecture. As its open-source architecture, it can be used in mu...
Memory safety issues are a persistent source of security vulnerabilities, with conventional architec...
Architecture specifications notionally define the fundamental interface between hardware and softwar...
The root causes of many security vulnerabilities include a pernicious combination of two problems, o...
In this paper a practical methodology for formally verifying RISC cores is presented. This methodolo...
Capability Hardware Enhanced RISC Instructions (CHERI) supplement the conventional memory management...
The instruction set architecture (ISA) specifies a contract between hardware and software; it covers...
The Verification methodology of modern processor designs is an enormous challenge. As processor desi...
The topic of this master thesis is Formal verification of RISC-V processor with Questa PropCheck usi...
The paper presents a sequence of three projects on design and formal verification of pipelined and s...
We study the applicability of the logic of Positive Equality with Uninterpreted Functions (PEUF) [2...
By abstracting the details of the data representations and operations in a microprocessor, term-leve...
Embedded systems are deployed ubiquitously among various sectors including automotive, medical, robo...