This thesis presents the design, implementation, and evaluation of a novel capability operating system: CheriOS. The guiding motivation behind CheriOS is to provide strong security guarantees to programmers, even allowing them to continue to program in fast, but typically unsafe, languages such as C. Furthermore, it does this in the presence of an extremely strong adversarial model: in CheriOS, every compartment -- and even the operating system itself -- is considered actively malicious. Building on top of the architecturally enforced capabilities offered by the CHERI microprocessor, I show that only a few more capability types and enforcement checks are required to provide a strong compartmentalisation model that can facilitate mutual dist...
The root causes of many security vulnerabilities include a pernicious combination of two problems, o...
Capability Hardware Enhanced RISC Instructions (CHERI) supplement the conventional memory management...
Personal computer owners often want to be able to run security-critical programs on the same machine...
CHERI extends a conventional RISC Instruction- Set Architecture, compiler, and operating system to s...
CHERI extends a conventional RISC Instruction-Set Architecture, compiler, and operating system to su...
Embedded systems are deployed ubiquitously among various sectors including automotive, medical, robo...
Contemporary CPU architectures conflate virtualization and protection, imposing virtualization-rela...
Abstract—CHERI extends a conventional RISC Instruction-Set Architecture, compiler, and operating sys...
This dissertation explores the use of capability security hardware and software in real-time and lat...
Existing high-end embedded systems face frequent security attacks. Software compartmentalization is ...
Vulnerabilities in computer systems arise in part due to programmer's logical errors, and in part al...
Vulnerabilities in computer systems arise in part due to programmer's logical errors, and in part al...
Capability Hardware Enhanced RISC Instructions (CHERI) supplement the conventional memory management...
The need to secure software systems is more important than ever. However, while a lot of work exists...
The need to secure software systems is more important than ever. However, while a lot of work exists...
The root causes of many security vulnerabilities include a pernicious combination of two problems, o...
Capability Hardware Enhanced RISC Instructions (CHERI) supplement the conventional memory management...
Personal computer owners often want to be able to run security-critical programs on the same machine...
CHERI extends a conventional RISC Instruction- Set Architecture, compiler, and operating system to s...
CHERI extends a conventional RISC Instruction-Set Architecture, compiler, and operating system to su...
Embedded systems are deployed ubiquitously among various sectors including automotive, medical, robo...
Contemporary CPU architectures conflate virtualization and protection, imposing virtualization-rela...
Abstract—CHERI extends a conventional RISC Instruction-Set Architecture, compiler, and operating sys...
This dissertation explores the use of capability security hardware and software in real-time and lat...
Existing high-end embedded systems face frequent security attacks. Software compartmentalization is ...
Vulnerabilities in computer systems arise in part due to programmer's logical errors, and in part al...
Vulnerabilities in computer systems arise in part due to programmer's logical errors, and in part al...
Capability Hardware Enhanced RISC Instructions (CHERI) supplement the conventional memory management...
The need to secure software systems is more important than ever. However, while a lot of work exists...
The need to secure software systems is more important than ever. However, while a lot of work exists...
The root causes of many security vulnerabilities include a pernicious combination of two problems, o...
Capability Hardware Enhanced RISC Instructions (CHERI) supplement the conventional memory management...
Personal computer owners often want to be able to run security-critical programs on the same machine...