YoVDO

Security Analysis of CHERI ISA

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Software Development Courses Security Analysis Courses Memory Protection Courses

Course Description

Overview

Explore a comprehensive security analysis of the CHERI ISA extension in this 39-minute Black Hat conference talk. Delve into the memory-protection features that enable historically memory-unsafe programming languages like C and C++ to provide robust, compatible, and efficient protections against widely exploited memory safety vulnerabilities. Examine the security guarantees offered by the architecture and learn how compilers and software can leverage CHERI ISA to enforce enhanced memory safety in legacy code. Presented by Saar Amar and Nicolas Joly, this talk offers valuable insights for security professionals and developers interested in advancing memory safety in critical systems.

Syllabus

Security Analysis of CHERI ISASecurity Analysis of CHERI ISA


Taught by

Black Hat

Related Courses

Armv8-M Architecture Fundamentals
Arm Education via Coursera
Memory Management in OS - Contiguous Memory Allocation
CodeHelp - by Babbar via YouTube
Shreds - Fine-Grained Execution Units with Private Memory
IEEE via YouTube
CHERI - A Hybrid Capability-System Architecture for Scalable Software Compartmentalization
IEEE via YouTube
XMP: Selective Memory Protection for Kernel and User Space
IEEE via YouTube