Загрузка...

MMU-based revocation for temporal safety on CHERI application cores - Tariq Kurd & Alfredo Mazzinghi

Use-after-free and use-after-reallocate exploits make up roughly half of the 70% of exploits which CHERI can address, for example in the Chromium browser: https://www.chromium.org/Home/chromium-security/memory-safety/

The Svucrg standard extension is based upon the CHERIBSD revocation scheme used on Morello, which is currently being ported to CHERI-RISC-V to address these vulnerabilities.

This talk explains the extension, and the revocation algorithm to spread awareness of the problem and the current solution.

Filmed at the CHERI Blossoms conference on 26 – 27 March 2026.

You can download the slides for the talk and find out more information on the conference website at: https://cheri-alliance.org/events/cheri-blossoms-conference-2026/

Interested in joining the CHERI Alliance? Find out more at: https://cheri-alliance.org/memberships/

Видео MMU-based revocation for temporal safety on CHERI application cores - Tariq Kurd & Alfredo Mazzinghi канала CHERI Alliance
Яндекс.Метрика
Все заметки Новая заметка Страницу в заметки
Страницу в закладки Мои закладки
На информационно-развлекательном портале SALDA.WS применяются cookie-файлы. Нажимая кнопку Принять, вы подтверждаете свое согласие на их использование.
О CookiesНапомнить позжеПринять