COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring. |
University of Cambridge > Talks.cam > REMS lunch > Software-driven ISA Design: How software requirements drove the evolution of the CHERI instruction set.
Software-driven ISA Design: How software requirements drove the evolution of the CHERI instruction set.Add to your list(s) Download to your calendar using vCal
If you have a question about this talk, please contact Peter Sewell. The version of the Capability Hardware Enhanced RISC Instructions (CHERI) architecture presented at ISCA this year was the second major revision of the CHERI ISA , adding a capability oriented memory protection model to a conventional RISC (MIPS R4K -compatible) base instruction set. CHERI was always intended to provide hardware-enforced security for software that forms part of trusted computing base, which is typically written in C or C++. These languages have an abstract model that allows implementations that provide strict memory protection but also have large bodies of legacy code (crucially, the code that could most benefit from improved security) that were not written with language-enforced memory safety in mind. The CHERI ISA underwent significant refinements as we added capability support to the Clang front end for LLVM and CHERI ISA support to the back end. It is now undergoing further refinement, leading to a third iteration of the instruction set, as we try to compile large bodies of software targeting CHERI . This talk will discuss the lessons learned at each step and the importance of evaluating computer architecture research with real-world software. This talk is part of the REMS lunch series. This talk is included in these lists:
Note that ex-directory lists are not shown. |
Other listsAll Faculty of Education Seminars Cambridge Post-Conflict and Post-Crisis Group PMRFPS's Pilot waves, Bohmian metaphysics, and the foundations of quantum mechanics CHUCOL seminars Challenging NeoliberalismOther talksBabraham Lecture - Deciphering the gene regulation network in human germline cells at single-cell & single base resolution Access to Medicines Computer vision techniques for measuring deformation Amphibian Evolution through Deep Time: Fossils, Genes and Regeneration The Design of Resilient Engineering Infrastructure Systems with Bayesian Networks Polish Britain: Multilingualism and Diaspora Community |