肌腱炎有什么症状| 消防队属于什么单位| 什么什么大什么| 下巴疼是什么原因| 什么动物没有眼睛| 尿液粉红色是什么原因| 晕车药有什么副作用| 常染色体是什么| 多巴胺是什么药| 什么叫直系亲属| 尼古丁是什么东西| 非油炸是什么意思| 浅笑嫣然是什么意思| 吃什么可以变白| 直肠壁增厚一般是什么情况| 栀子有什么作用与功效| 梗米是什么| 大象吃什么| 俊五行属性是什么| 清明节干什么| 为什么会流鼻血| 不可抗力是什么意思| 什么故事| 三伏天什么时候结束| 小孩割包皮挂什么科室| 引以为傲是什么意思| 店里来猫是什么兆头| 滥竽充数的充是什么意思| 韩信点兵什么意思| 28岁属相是什么生肖| 飞短流长是什么意思| 为什么血是红色的| 39年属什么生肖| 707是什么意思| 胃疼可以吃什么药| 月季花是什么颜色| 吃桃胶有什么作用| 经期可以喝什么茶| 接骨草长什么样| 相夫教子是什么意思| 七月十六号是什么星座| 碱什么意思| 阮小五的绰号是什么| 小孩半夜哭闹是什么原因| 月经一直不干净吃什么药| 双向转诊是什么意思| 夏天补什么| 为什么不能在床上打坐| 鼻梁痛什么原因引起的| 胸片是什么| 吃什么补血| 黑色属于什么五行属性| od是什么职位| 染发有什么危害| 汗疱疹用什么药膏最好| 钩藤为什么要后下| 昱怎么读音是什么| 看病人带什么水果| 五马分尸是什么意思| 一个草字头一个见念什么| 92年出生属什么| 自控能力是什么意思| 1月26日是什么星座| 将星是什么意思| 胃不好吃什么养胃水果| 右边偏头痛是什么原因| 胎记长什么样| o是什么元素| 付肾是什么药| 尿微量白蛋白高吃什么药| 省政协常委是什么级别| 淀粉样变是什么病| 如花是什么意思| 为什么会得霉菌性阴道炎| 皮肤长小肉粒是什么原因| 小孩白头发是什么原因引起的| 悲欢离合是什么意思| 痰多是什么问题| 归宁是什么意思| 蚂蚁代表什么风水| 称心如意是什么意思| 身体缺硒有什么症状| 尿痛什么原因引起的| 本命年犯太岁什么意思| 甲状腺属于什么科室| 血清胃功能检测是什么| 蒙脱石散适合什么腹泻| 翼字五行属什么| 省委副书记什么级别| 此刻朋友这杯酒最珍贵是什么歌| 道场是什么意思| 呱唧呱唧是什么意思| 什么是逆商| 血小板为0意味着什么| 御史相当于现在什么官| 一个火一个丙念什么| 为什么会有结石| 巨蟹座女生喜欢什么样的男生| 更年期有什么表现| 起酥油是什么油| 长期便秘是什么原因引起的| 依云矿泉水为什么贵| 肛门痒挂什么科| pick什么意思| 司令是什么军衔| 睾丸疼是什么原因| 桃子不能和什么食物一起吃| 石女什么意思| 胆碱酯酶高是什么意思| 不明觉厉是什么意思| 米索前列醇片是什么药| 面粉是什么粉| 畏寒怕冷是什么原因| 莲花与荷花有什么区别| 医院建档是什么意思| 有什么可以快速止痒的方法| 劫是什么意思| 喉咙肿痛吃什么药好| 什么情况下会流前列腺液| 为什么吃了饭就想睡觉| 私处长痘痘是什么原因| 农历正月初一是什么节日| 为什么精子是黄色的| 吃什么水果对嗓子好| 尿维生素c阳性是什么意思| 牛建读什么| 30年婚姻是什么婚| 支数是什么意思| dr是什么检查| 钓黑鱼用什么饵最好| 母亲节要送什么礼物| 脱疽是什么意思| 血沉50说明什么原因| hoka跑鞋中文叫什么| 波罗蜜多什么意思| 叛变是什么意思| 狗的胡须有什么用| mango是什么意思| 结婚下雨有什么说法| 猫抓病是什么病| 日本全称是什么| 预防医学是干什么的| 白垩纪是什么意思| 利福平是什么药| 鱼休子是什么| 终其一生下一句是什么| 全棉和纯棉有什么区别| 什么动物的牙齿最多| 我行我素的人什么性格| 吃华法林不能吃什么| 300分能上什么大学| 肠胃不舒服挂什么科| 每天流鼻血是什么原因| 会车是什么| iga什么意思| gg是什么牌子的包包| 尿酸偏高是什么病| 五蕴指什么| 英红九号红茶什么档次| 杜冷丁是什么| 牛油果和什么榨汁好喝| 亚历山大王什么档次| 68岁属什么| mb是什么意思| 3月16号是什么星座的| 做阴超有黄体说明什么| 空调除湿是什么标志| 小朋友膝盖疼是什么原因| 玉兰油适合什么年龄| 串门是什么意思| 属虎适合佩戴什么饰品| 雅号是什么意思| 金骏眉是什么茶| 玉帝叫什么名字| 谷字五行属什么| 扭曲是什么意思| 打感情牌是什么意思| 1934年属什么生肖| 失足妇女是什么意思| 免疫力低下吃什么药| 孩子过敏性咳嗽吃什么药好| 都有什么大学| 孕妇上火了吃什么降火最快| 什么时候闰九月| prn医学上是什么意思| 做无创需要注意什么| 二次元是什么| 什么茶可以减肥消脂| 坊字五行属什么| 脊髓病变是什么病| 脾胃伏火是什么意思| 1978年出生是什么命| 男人地盘是什么生肖| 胃溃疡适合吃什么食物| 古对什么| 月经吃什么水果| 两小儿辩日告诉我们什么道理| 嘴贫是什么意思| 郑州机场叫什么名字| 蓝眼睛的猫是什么品种| 吃桃子有什么好处| 远视是什么意思| 为什么空腹血糖比餐后血糖高| 郎酒是什么香型| 金刚是什么树的种子| 企鹅是什么意思| 血沉高意味着什么意思| cm是什么| 过敏输液输什么药好| 脑电图轻度异常什么病| 5月25日什么星座| 仓鼠能吃什么水果| vodka是什么酒| 皮肤黑的人穿什么颜色的衣服显白| 酒是什么| 白天尿少晚上尿多什么原因| 什么是性压抑| 蒙圈什么意思| 靶向药物是什么| 什么的小狗| 戍是什么意思| 电磁炉滴滴响不加热是什么原因| 卫生局是什么单位| 吃什么治肝病| 吃什么不会便秘| 有氧运动是什么意思| 高硼硅是什么材质| 邮箱抄送是什么意思| 银杏叶是什么颜色| 海纳百川什么意思| 查血挂什么科| 91网站是什么| 什么叫内分泌失调| 双鱼座有什么特点| 磷是什么元素| 小孩手足口病吃什么食物好| 相害是什么意思| 塌腰是什么意思| 心咒是什么意思| 点心是什么意思| 潜力是什么意思| 中队长是什么级别| 偏头疼挂什么科室| 2014年什么年| 宫腔积液和盆腔积液有什么区别| 肠胃炎是什么引起的| 希五行属什么| eee是什么牌子的鞋| 什么生活| 摩羯前面是什么星座| 脸上爱出油是什么原因| 正在候车是什么意思| 澳门区花是什么花| 猪狗不如是什么意思| 腹腔积水是什么原因造成的| 前列腺炎不能吃什么| 嘴唇发黑是什么症状| 与什么俱什么| 安宫牛黄丸治什么病| 鱼加它是什么字| 时来运转是什么生肖| 体质是什么意思| 做完肠镜需要注意什么| 有是什么意思| 百度Jump to content

美丽河北--河北频道--人民网

From Wikipedia, the free encyclopedia
百度 旗袍文化是生活文化,是美丽文化,是女人文化,如果走秀,也应该是在西湖边,为西湖增添美景。

Capability Hardware Enhanced RISC Instructions (CHERI) is a technology designed to improve security for reduced instruction set computer (RISC) processors. CHERI aims to address the root cause of the problems caused by lack of memory safety in common implementations of programming languages such as C and C++, which are responsible for around 70% of security vulnerabilities in modern systems.[1][2]

The hardware works by giving each reference to any piece of data or system resource its own access rules. This prevents programs from accessing or changing things they should not. It also makes it hard to trick a part of a program into accessing or changing something that it should be able to access, but at a different time. The same mechanism is used to implement privilege separation, dividing processes into compartments that limit the damage that a bug (security or otherwise) can do.

CHERI can be added to many different instruction set architectures including MIPS, AArch64, and RISC-V, making it usable across a wide range of platforms.

Software must be recompiled to gain fine-grained memory-safety benefits from CHERI, but most software requires few (if any) changes to the source code.[3] CHERI's importance has been recognised by governments as a way to improve cybersecurity and protect critical systems.[4] It is under active development by various business and academic organizations.[5]

Background

[edit]

CHERI is a capability architecture.[6] Early capability architectures, such as the CAP computer and Intel iAPX 432, demonstrated secure memory management, but were hindered by performance overheads and complexity.[7] As systems became faster and more complex, vulnerabilities like buffer overflows and use-after-free errors became widespread. CHERI addresses these challenges with a design intended for modern computing environments. It enforces memory safety and provides secure sharing and isolation to handle increasing software complexity and combat cyberattacks.

In the 1970s and 1980s early capability architectures such as the CAP computer (developed at the University of Cambridge) and the Intel iAPX 432 demonstrated strong security properties. These systems relied on indirection tables to manage capabilities, introducing performance bottlenecks as memory access required multiple lookups. While this approach worked when processors were slow and memory was fast, it became impractical by the mid-1980s as processors became faster and memory access times lagged behind.[7]

In 2010 DARPA launched the Clean-slate design of Resilient, Adaptive, Secure Hosts (CRASH) programme,[8][9] which tasked participants with redesigning computer systems to improve security. SRI International and University of Cambridge team revisited capability architectures, seeking to address memory safety challenges inherent in conventional designs.

Mechanism

[edit]
Pointers lowered to CHERI capabilities or addresses.
Memory access with and without CHERI.

A CHERI system operates at a hardware level by providing a hardware-enforced type (a CHERI capability) that authorises access to memory. This type includes an address and other metadata, such as bounds and permissions. Instructions such as loads, stores, and jumps, that access memory use one of these types to authorise access, whereas on traditional architectures they would simply use an address.

This metadata is stored inline, alongside the address, in the computer's memory and protected by a tag bit, which is cleared if the capability is tampered with. This informs the computer of which areas of memory can be accessed through a specific operation and how a program can modify or read memory through that operation. This allows CHERI systems to catch cases where memory that was outside the bounds of where the program was supposed to read or write to was operated on. Associating the metadata with the value used to access memory, rather than with the memory being accessed (in contrast to a memory management unit) means that the hardware can catch cases where a program attempts to access a part of memory that it should have access to while intending to access a different piece of memory.

Implementations of CHERI systems also include modifications to the default memory allocator, which is a component that defines that a range of addresses should be treated by a program as an object. On a CHERI system, it must also communicate this information to the hardware, by setting the bounds on the pointer (represented by a CHERI capability) that is returned.[10] It may also communicate the lifetime, to prevent use-after-free or use-after-reuse bugs.[11][12][13]

Depending on the context, CHERI systems can be used to enhance compiler-level checks, build secure enclaves,[14] or even be used to augment existing instruction architectures. A report by Microsoft in 2019 found that CHERI's protections could be used to mitigate over 70% of memory safety issues found in 2019 at the company.[15] CHERI architectures are also designed to be backward compatible with existing programming languages such as C and C++. A study performed by University of Cambridge researchers found that porting six million lines of C and C++ source code to CHERI required changes to 0.026% of the source lines of code (LoC).[3]

Limits

[edit]

The architecture introduces hardware complexity due to the tag-bit mechanisms and capability checks needed to enforce memory safety. Although optimizing has been implemented to minimise these impacts,[16] the performance trade-offs can vary depending on specific workloads and specific implementations. Further, CHERI needs modifications to both software and hardware ecosystems. Implementations such as Morello allow unmodified binaries to run, but these get no added security benefits. Software must be recompiled or adapted to use CHERI's capability-based model, and hardware makers must incorporate CHERI extensions into their designs.

Standardisation remains an ongoing effort. While initiatives such as the CHERI Alliance[17] and RISC-V standardisation[18] aim to establish broader support, the lack of widely accepted industry standards for CHERI features have delayed adoption. Adapting legacy software or retrofitting existing systems to work with CHERI can be challenging, particularly for large and heterogeneous codebases. The difficulty often stems from programming practices used during the software's original development, such as implementing custom memory management, where identifying pointers from integers can be particularly problematic.[19]

Implementations

[edit]

The CHERI architecture has been implemented across multiple platforms and projects:

  • Morello – Developed by Arm as part of the UKRI-funded Digital Security by Design (DSbD) programme,[20][21] the Morello chip is a superset architecture designed to evaluate experimental CHERI features for potential production use on the AArch64 architecture. The Morello board supports CheriBSD, custom versions of Android, and Linux. It remains a research prototype.
  • CHERIoT – Introduced by Microsoft in 2023[22] and now developed by multiple vendors,[23] CHERIoT is a RISC-V CHERI adaptation optimised for small embedded devices.[12] CHERIoT is a hardware-software co-designed project and builds a custom real-time operating system (RTOS) and compartment model along with specialised hardware to provide string security guarantees. It incorporates advanced memory safety features inspired by the CHERI temporal safety projects performed on Morello.
  • Sonata – Developed by lowRISC and manufactured by NewAE as part of the UKRI-funded Sunburst project, the Sonata platform is an FPGA-based system designed to run RISC-V architectures.[24] The board has an open-source design, allowing researchers and developers to modify and adapt its hardware and software. Sonata is primarily designed as a prototyping system for CHERIoT.
  • X730 – Released by Codasip in 2024, this processor IP is an implementation of the draft RISC-V CHERI standard for an application-class processor.[25]
  • ICENI – Announced by SCI Semiconductor in 2024,[26] ICENI is a CHERIoT-compatible microcontroller designed for secure embedded systems.

CHERI implementations that target mainstream operating systems are designed to accommodate both legacy and pure capability software, allowing for gradual adaptation for existing applications. CHERI has also been implemented across various hardware architectures in a research setting, including MIPS,[6] AArch64 (via the Morello platform), and RISC-V.[27]

History

[edit]

By 2012 early CHERI prototypes were presented,[28] These prototypes ran a microkernel with hand-written assembly for manipulating capabilities. CHERI was designed to be easy to implement on modern superscalar pipelined architectures. Unlike earlier capability systems, CHERI eliminated the need for indirection tables,[6] avoiding the associated performance issues and proving that modern capability architectures could be efficiently implemented.

In 2014 CHERI hardware demonstrated its ability to run a full UNIX-like operating system, FreeBSD. This demonstration showed that CHERI's capability model can integrate with existing software ecosystems. CHERI was originally prototyped as an extension to MIPS-64.[6] The implementation used 256-bit capabilities, containing fields for a 64-bit base, length, object type, and permissions, with some bits reserved for experimental purposes.

In 2015 CHERI introduced a new capability encoding model that separated the address (referred to as a cursor) from the bounds and permissions. This refinement allowed capabilities to function as pointers in compiled C code,[13] improving usability. That same year, Arm joined the project and provided critical feedback, highlighting that while doubling pointer sizes might be acceptable, quadrupling them would not. This feedback led to the development of CHERI Concentrate,[16] a compressed encoding model that reduced capability size to 128 bits by eliminating redundancy between the base, address, and top.

In 2019 CheriABI[29] demonstrated a fully memory-safe implementation of POSIX, allowing existing desktop software to become memory safe with a single recompile.

By 2020 it became evident that software vendors were reluctant to port their software without hardware vendor support, while hardware vendors were unwilling to produce chips without sufficient customer demand. UK Research and Innovation (UKRI) launched the Digital Security by Design (DSbD) programme[30] to address adoption barriers for CHERI. The programme allocated £70M, matched by £100M of industrial investment, to build the CHERI software ecosystem.[30]

This initiative funded Arm's Morello chip, a superset architecture designed to evaluate experimental CHERI features for potential production use based on AArch64. The Morello board was designed to run CheriBSD, and custom versions of Android and Linux. At the same time, the Cornucopia[31] project demonstrated that CHERI could enforce both spatial and temporal memory safety, offering deterministic protection against heap object temporal aliasing (roughly, "use-after-free"). The follow-up project, Cornucopia Reloaded,[11] showcased efficient temporal safety using page-table features in Morello, in particular, near-negligible pause times for the application making use of revocation.

In 2023 Microsoft introduced CHERIoT,[12] a RISC-V CHERI adaptation optimised for small embedded devices. CHERIoT incorporated ideas from Cornucopia and memory colouring techniques such as SPARC ADI and Arm MTE to enhance security. As part of the UKRI-funded Sunburst project, lowRISC launched the Sonata platform to advance RISC-V-based CHERI development and support standardisation efforts. Both the CHERI RISC-V research work and CHERIoT fed into the standardisation process for an official CHERI family of RISC-V extensions.[18] Codasip announced that they had RISC-V IP cores with CHERI extensions available to license.[32]

The CHERI Alliance was launched in 2024.[33] This non-profit organisation was formed by a number of high-tech companies to accelerate CHERI adoption. It provides a platform for collaboration and helps the technology become more visible and easier to use. Its goal is to aggregate the ecosystem and welcomes members interested in CHERI, from commercial companies to universities, research centres, and open-source communities. It is organised in working groups[34] that focus on specific themes (operating systems porting, tools, design recommendations...). It also organises conferences focused on CHERI[35] and participates to a number of events to promote the technology.

By 2024 SCI Semiconductors announced ICENI,[26] a CHERIoT-compatible chip designed specifically for secure embedded systems. Codasip is actively developing a Linux kernel implementation for the RISC-V architecture.[36] The CHERI Alliance, a non-profit organisation based in Cambridge, UK, was established to promote the adoption of CHERI technology and its integration into secure digital products and systems, including Google as a founding member.[5]

In 2025 Wyvern Global's Semiconductors Division announced WARP,[37] the first commercially available CHERI-BSD native RISC-V chipset built from the ground up with CHERI in mind, and announced an OEM adoption programme under the same name for existing manufacturer's to integrate the technology into their existing boards using the WARP chipset. They have also pledged adoption of CHERI into all of their existing products and services end-to-end going forward and joined the CHERI alliance C.I.C [38]

References

[edit]
  1. ^ Cimpanu, Catalin (22 May 2020). "Chrome: 70% of all security bugs are memory safety issues". ZDNET. Retrieved 8 June 2025.
  2. ^ Cimpanu, Catalin (11 February 2019). "Microsoft: 70 percent of all security bugs are memory safety issues". ZDNET. Retrieved 8 June 2025.
  3. ^ a b Robert N. M. Watson; Ben Laurie; Alex Richardson (17 September 2021). Assessing the Viability of an Open-Source CHERI Desktop Software Ecosystem (PDF) (Technical report). Capabilities Ltd.
  4. ^ "Final ONCD Technical Report" (PDF). White House. Office of the National Cyber Director. February 2024. Archived (PDF) from the original on 21 January 2025. Retrieved 21 January 2025.
  5. ^ a b Manners, David (13 November 2024). "CHERI Alliance launched". Electronics Weekly. Retrieved 20 January 2025.
  6. ^ a b c d Jonathan Woodruff; Robert N. M. Watson; David Chisnall; Simon W. Moore; Jonathan Anderson; Brooks Davis; Ben Laurie; Peter G. Neumann; Robert Norton; Michael Roe (2014). The CHERI capability model: Revisiting RISC in an age of risk. 2014 ACM/IEEE 41st International Symposium on Computer Architecture (ISCA). Minneapolis, MN, USA. pp. 457–468. doi:10.1109/ISCA.2014.6853201.
  7. ^ a b Levy, Henry M. (1984). Capability-based computer systems. Bedford, Mass.: Digital Press. ISBN 978-1483107400. Retrieved 24 January 2025.
  8. ^ "CRASH: Clean-slate design of Resilient, Adaptive, Secure Hosts". DARPA. 2010. Retrieved 18 January 2025.
  9. ^ "DARPA's CRASH Program Reinvents The Computer For Better Security". Breaking Defence. 21 December 2012. Retrieved 18 January 2025.
  10. ^ Bramley, Jacob; Jacob, Dejice; Lascu, Andrei; Singer, Jeremy; Tratt, Laurence (6 June 2023). "Picking a CHERI Allocator: Security and Performance Considerations" (PDF). Proceedings of the 2023 ACM SIGPLAN International Symposium on Memory Management. ISMM 2023. New York, NY, USA: Association for Computing Machinery. pp. 111–123. doi:10.1145/3591195.3595278. ISBN 979-8-4007-0179-5.
  11. ^ a b Nathaniel Wesley Filardo; Brett F. Gutstein; Jonathan Woodruff; Jessica Clarke; Peter Rugg; Brooks Davis; Mark Johnston; Robert Norton; David Chisnall; Simon W. Moore; Peter G. Neumann; Robert N. M. Watson (2024). "Cornucopia Reloaded: Load Barriers for CHERI Heap Temporal Safety". Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2 (ASPLOS '24). Vol. 2. New York, NY, USA: Association for Computing Machinery. pp. 251–268. doi:10.1145/3620665.3640416.
  12. ^ a b c Saar Amar; David Chisnall; Tony Chen; Nathaniel Wesley Filardo; Ben Laurie; Kunyan Liu; Robert Norton; Simon W. Moore; Yucong Tao; Robert N. M. Watson; Hongyan Xia (2023). "CHERIoT: Complete Memory Safety for Embedded Devices". Proceedings of the 56th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO '23). New York, NY, USA: Association for Computing Machinery. pp. 641–653. doi:10.1145/3613424.3614266.
  13. ^ a b David Chisnall; Colin Rothwell; Robert N.M. Watson; Jonathan Woodruff; Munraj Vadera; Simon W. Moore; Michael Roe; Brooks Davis; Peter G. Neumann (2015). "Beyond the PDP-11: Architectural Support for a Memory-Safe C Abstract Machine". Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS '15). New York, NY, USA: Association for Computing Machinery. pp. 117–130. doi:10.1145/2694344.2694367.
  14. ^ Van Strydonck, Thomas; Noorman, Job; Jackson, Jennifer; Alves Dias, Leonardo; Vanderstraeten, Robin; Oswald, David; Piessens, Frank; Devriese, Dominique (1 July 2023). CHERI-TrEE: Flexible enclaves on capability machines. 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P). IEEE. pp. 1143–1159. doi:10.1109/EuroSP57164.2023.00070. ISBN 978-1-6654-6512-0.
  15. ^ "Security Analysis of CHERI ISA". Microsoft Security Response Center blog. Retrieved 21 January 2025.
  16. ^ a b Jonathan Woodruff; Alexandre Joannou; Hongyan Xia; Anthony Fox; Robert Norton; Thomas Bauereiss; David Chisnall; Brooks Davis; Khilan Gudka; Nathaniel W. Filardo; A. Theodore Markettos; Michael Roe; Peter G. Neumann; Robert N. M. Watson; Simon W. Moore (2019). "CHERI Concentrate: Practical Compressed Capabilities". IEEE Transactions on Computers. 68 (10). IEEE: 1455–1469. doi:10.1109/TC.2019.2914037.
  17. ^ "CHERI Alliance – Industry-led security technology". CHERI Alliance. Retrieved 27 January 2025.
  18. ^ a b "CHERI Ratification Plan". Retrieved 10 January 2025.
  19. ^ Robert N.M. Watson; David Chisnall; Jessica Clarke; Brooks Davis; Nathaniel Wesley Filardo; Ben Laurie; Simon W. Moore; Peter G. Neumann; Alexander Richardson; Peter Sewell; Konrad Witaszczyk; Jonathan Woodruff (July–August 2024). "CHERI: Hardware-Enabled C/C++ Memory Protection at Scale". IEEE Security & Privacy. 22 (4): 50–61. doi:10.1109/MSEC.2024.3396701.
  20. ^ "Arm Morello Program". Retrieved 9 January 2025.
  21. ^ Robinson, Dan. "How Arm popped CHERI architecture into Morello Program hardware". The Register. Retrieved 11 January 2025.
  22. ^ Saar Amar; Tony Chen; David Chisnall; Felix Domke; Nathaniel Filardo; Kunyan Liu; Robert Norton-Wright; Yucong Tao; Robert N. M. Watson; Hongyan Xia (February 2023). CHERIoT: Rethinking security for low-cost embedded systems (Technical report). Microsoft. MSR-TR-2023-6.
  23. ^ "Who controls the CHERIoT project?". November 2024. Retrieved 20 January 2025.
  24. ^ "Welcome to the Sunburst Project". lowRISC. Retrieved 20 January 2025.
  25. ^ "Codasip Protects Memory With Cheri". TechInsights.com. Retrieved 27 January 2025.
  26. ^ a b Flaherty, Nick (23 October 2024). "First CHERI RISC-V embedded chip and Early Access Programme". eeNews Europe. Retrieved 11 January 2025.
  27. ^ "CHERI-Piccolo, CHERI-Flute, and CHERI-Toooba CPU cores on FPGA". Retrieved 24 January 2025.
  28. ^ Robert N.M. Watson; Peter G. Neumann; Jonathan Woodruff; Jonathan Anderson; Ross Anderson; Nirav Dave; Ben Laurie; Simon W. Moore; Steven J. Murdoch; Philip Paeps; Michael Roe; Hassen Saidi (2 March 2012). CHERI: a research platform deconflating hardware virtualization and protection (PDF). Workshop on Runtime Environments, Systems, Layering and Virtualized Environments (RESoLVE 2012).
  29. ^ Brooks Davis; Robert N. M. Watson; Alexander Richardson; Peter G. Neumann; Simon W. Moore; John Baldwin; David Chisnall; Jessica Clarke; Nathaniel Wesley Filardo; Khilan Gudka; Alexandre Joannou; Ben Laurie; A. Theodore Markettos; J. Edward Maste; Alfredo Mazzinghi; Edward Tomasz Napierala; Robert M. Norton; Michael Roe; Peter Sewell; Stacey Son; Jonathan Woodruff (2019). "CheriABI: Enforcing Valid Pointer Provenance and Minimizing Pointer Privilege in the POSIX C Run-time Environment". Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS '19). New York, NY, USA: Association for Computing Machinery. pp. 379–393. doi:10.1145/3297858.3304042.
  30. ^ a b "Digital security by design". UK Research and Innovation. 2020. Retrieved 18 January 2025.
  31. ^ Nathaniel Wesley Filardo; Brett F. Gutstein; Jonathan Woodruff; Sam Ainsworth; Lucian Paul-Trifu; Brooks Davis; Hongyan Xia; Edward Tomasz Napierala; Alexander Richardson; John Baldwin; David Chisnall; Jessica Clarke; Khilan Gudka; Alexandre Joannou; A. Theodore Markettos; Alfredo Mazzinghi; Robert M. Norton; Michael Roe; Peter Sewell; Stacey Son; Timothy M. Jones; Simon W. Moore; Peter G. Neumann; Robert N. M. Watson (18–20 May 2020). "Cornucopia: Temporal Safety for CHERI Heaps" (PDF). Proceedings of the 41st IEEE Symposium on Security and Privacy (Oakland 2020). San Jose, CA, USA. doi:10.1109/SP40000.2020.00098.
  32. ^ "Codasip delivers first commercial CHERI processor using RISC-V". eeNews. 2 November 2023. Retrieved 20 January 2025.
  33. ^ Flaherty, Nick (12 November 2024). "CHERI builds global chip security alliance". eeNews Europe. Retrieved 22 July 2025.
  34. ^ "CHERI Alliance – Working Groups". CHERI Alliance. Retrieved 22 July 2025.
  35. ^ "CHERI Alliance – Events". CHERI Alliance. Retrieved 22 July 2025.
  36. ^ "Codasip enables secure Linux by donating CHERI RISC-V SDK to the CHERI Alliance". Codasip. 21 October 2024. Retrieved 20 January 2025.
  37. ^ "Wyvern Advanced RISC-V Processor". Wyvern Global. 11 July 2025. Retrieved 11 July 2025.
  38. ^ "Wyvern Global Joins CHERI alliance". CHERI Alliance. 11 July 2025. Retrieved 11 July 2025.
炁读什么 73岁属什么 车厘子不能和什么一起吃 文武双全是什么生肖 腹膜转移是什么意思
钟点房是什么意思 接下来有什么节日 .什么意思 日久见人心是什么意思 女人手心发热是什么原因
桂圆不能和什么一起吃 经常做噩梦是什么原因 哂是什么意思 靓女是什么意思 今期难过美人关是什么生肖
什么动物吃草 羁押是什么意思 抑郁状态和抑郁症有什么区别 绿是什么 孙权为什么不北伐
adh是什么hcv9jop2ns7r.cn 盆腔积液是什么意思啊hcv7jop5ns2r.cn 着痹是什么意思hcv8jop6ns1r.cn 来例假喝红糖水有什么好处hcv7jop4ns6r.cn ppi是什么药hcv9jop8ns3r.cn
螺旋体感染是什么意思hcv8jop5ns7r.cn 晚上总是做梦是什么原因引起的hcv8jop5ns3r.cn 尿道炎和阴道炎有什么区别hcv8jop0ns9r.cn 腿软无力是什么原因hcv7jop9ns3r.cn 六月份生日是什么星座sanhestory.com
为什么今年闰六月hcv8jop0ns1r.cn 没睡好头疼是什么原因hcv7jop4ns8r.cn rmb是什么货币hcv8jop6ns7r.cn 21三体高风险是什么原因造成的hcv8jop9ns0r.cn 什么时候闰十二月cl108k.com
1221是什么星座hcv8jop9ns2r.cn 血常规白细胞偏高是什么原因shenchushe.com 耳朵痒用什么药最有效hcv8jop5ns8r.cn 什么身是胆hcv8jop7ns4r.cn 乙肝45阳性什么意思hcv8jop0ns3r.cn
百度