Blogs (1) >>
POPL 2019
Sun 13 - Sat 19 January 2019 Cascais, Portugal
Sun 13 Jan 2019 11:30 - 12:00 at Sala VI - Session 2 Chair(s): Dominique Devriese

C++ remains the language of choice for writing large performant server and client applications but lacks memory- and type-safety and is thus vulnerable to spatial and temporal-related security attacks. The CHERI architecture provides fine-grained memory protection in hardware. We have developed the CHERI Clang/LLVM compiler that can compile existing C and C++ programs to CHERI, thus enabling strong memory protection with minimal changes to code. More recently, we have been looking at using CHERI to protect C++ applications: there are many interesting design-space questions as to how the CHERI protection model could be used to protect the C++ run-time (e.g. vtables) and C++ programs in general. We have been investigating some of these through the rendering engine WebKit, commonly used in popular web browsers. This talk will present some of the ways CHERI can be used in the context of C++ with the hope of inviting further discussion.

Presentation (cheri-cxx.pdf)8.87MiB

Conference Day
Sun 13 Jan

Displayed time zone: Belfast change

11:00 - 12:30
Session 2PriSC at Sala VI
Chair(s): Dominique DevrieseVrije Universiteit Brussel, Belgium
11:00
30m
Talk
Trestle: Bridging the Performance and Safety Divide in WebAssembly
PriSC
Craig DisselkoenUniversity of California San Diego, Tal GarfinkelStanford University, Deian StefanUniversity of California San Diego, Conrad WattUniversity of Cambridge
File Attached
11:30
30m
Talk
Protecting C++ Applications Using CHERI
PriSC
Khilan GudkaUniversity of Cambridge, Alexander RichardsonUniversity of Cambridge, Robert N. M. WatsonUniversity of Cambridge
File Attached
12:00
30m
Talk
Secure Linking in the CheriBSD Operating System
PriSC
Alexander RichardsonUniversity of Cambridge, Robert N. M. WatsonUniversity of Cambridge
File Attached