Read the original article: Security Analysis of CHERI ISA
Is it possible to get to a state where memory safety issues would be deterministically mitigated? Our quest to mitigate memory corruption vulnerabilities led us to examine CHERI (Capability Hardware Enhanced RISC Instructions), which provides memory protection features against many exploited vulnerabilities, or in other words, an architectural solution that breaks exploits. We’ve looked at …
Security Analysis of CHERI ISA Read More »
The post Security Analysis of CHERI ISA appeared first on Microsoft Security Response Center.
Read the original article: Security Analysis of CHERI ISA