Blogs (1) >>
POPL 2019
Sun 13 - Sat 19 January 2019 Cascais, Portugal
Sun 13 Jan 2019 11:30 - 12:00 at Sala VI - Session 2 Chair(s): Dominique Devriese

C++ remains the language of choice for writing large performant server and client applications but lacks memory- and type-safety and is thus vulnerable to spatial and temporal-related security attacks. The CHERI architecture provides fine-grained memory protection in hardware. We have developed the CHERI Clang/LLVM compiler that can compile existing C and C++ programs to CHERI, thus enabling strong memory protection with minimal changes to code. More recently, we have been looking at using CHERI to protect C++ applications: there are many interesting design-space questions as to how the CHERI protection model could be used to protect the C++ run-time (e.g. vtables) and C++ programs in general. We have been investigating some of these through the rendering engine WebKit, commonly used in popular web browsers. This talk will present some of the ways CHERI can be used in the context of C++ with the hope of inviting further discussion.

Presentation (cheri-cxx.pdf)8.87MiB

Sun 13 Jan

prisc-2019
11:00 - 12:30: PriSC 2019 - Session 2 at Sala VI
Chair(s): Dominique DevrieseVrije Universiteit Brussel, Belgium
prisc-201911:00 - 11:30
Talk
Craig DisselkoenUniversity of California San Diego, Tal GarfinkelStanford University, Deian StefanUniversity of California San Diego, Conrad WattUniversity of Cambridge
File Attached
prisc-201911:30 - 12:00
Talk
Khilan GudkaUniversity of Cambridge, Alexander RichardsonUniversity of Cambridge, Robert N. M. WatsonUniversity of Cambridge
File Attached
prisc-201912:00 - 12:30
Talk
Alexander RichardsonUniversity of Cambridge, Robert N. M. WatsonUniversity of Cambridge
File Attached