|国家预印本平台
首页|Biting the CHERI bullet: Blockers, Enablers and Security Implications of CHERI in Defence

Biting the CHERI bullet: Blockers, Enablers and Security Implications of CHERI in Defence

Biting the CHERI bullet: Blockers, Enablers and Security Implications of CHERI in Defence

来源:Arxiv_logoArxiv
英文摘要

There is growing interest in securing the hardware foundations software stacks build upon. However, before making any investment decision, software and hardware supply chain stakeholders require evidence from realistic, multiple long-term studies of adoption. We present results from a 12 month evaluation of one such secure hardware solution, CHERI, where 15 teams from industry and academia ported software relevant to Defence to Arm's experimental Morello board. We identified six types of blocker inhibiting adoption: dependencies, a knowledge premium, missing utilities, performance, platform instability, and technical debt. We also identified three types of enabler: tool assistance, improved quality, and trivial code porting. Finally, we identified five types of potential vulnerability that CHERI could, if not appropriately configured, expand a system's attack surface: state leaks, memory leaks, use after free vulnerabilities, unsafe defaults, and tool chain instability. Future work should remove potentially insecure defaults from CHERI tooling, and develop a CHERI body of knowledge to further adoption.

Shamal Faily

军事技术自动化技术、自动化技术设备计算技术、计算机技术

Shamal Faily.Biting the CHERI bullet: Blockers, Enablers and Security Implications of CHERI in Defence[EB/OL].(2025-04-24)[2025-06-18].https://arxiv.org/abs/2504.17904.点此复制

评论