Security Analysis of CHERI ISA
Offered By: Black Hat via YouTube
Course Description
Overview
Explore a comprehensive security analysis of the CHERI ISA extension in this 39-minute Black Hat conference talk. Delve into the memory-protection features that enable historically memory-unsafe programming languages like C and C++ to provide robust, compatible, and efficient protections against widely exploited memory safety vulnerabilities. Examine the security guarantees offered by the architecture and learn how compilers and software can leverage CHERI ISA to enforce enhanced memory safety in legacy code. Presented by Saar Amar and Nicolas Joly, this talk offers valuable insights for security professionals and developers interested in advancing memory safety in critical systems.
Syllabus
Security Analysis of CHERI ISASecurity Analysis of CHERI ISA
Taught by
Black Hat
Related Courses
Requirements Specifications: Goals and Conflict AnalysisUniversity of Colorado System via Coursera Threat and Vulnerability Management for CompTIA CySA+
Pluralsight Network Security Monitoring (NSM) with Security Onion
Pluralsight Security Event Triage: Operationalizing Security Analysis
Pluralsight Complete Guide to Elasticsearch
Udemy