CheriABI: enforcing valid pointer provenance and minimizing pointer privilege in the POSIX C run-time environment
The Morning Paper
MAY 27, 2019
Last week we saw the benefits of rethinking memory and pointer models at the hardware level when it came to object storage and compression ( Zippads ). The protections are hardware implemented and cannot be forged in software. code is not given access to excessive capabilities. ASPLOS’19. CHERI implementation.
Let's personalize your content