I’ve been hitting a good stride moving forward on this, which is good because I’ve been pretty mentally constipated on doing anything that I can even pretend is useful.| Hey There Buddo!
I’ve worked on binary verification tooling for a while.| Hey There Buddo!
The Cybersecurity and Infrastructure Security Agency (CISA) has identified memory safety vulnerabilities as a major cybersecurity risk 1, pointing to reports that 70% or more of security vulnerabilities were found to involve memory-safety issues. CHERIoT 2 is a new architecture that seeks to provide strong protection against many frequently exploited memory vulnerabilities. CHERIoT is based on using CHERI 3 capability hardware-extensions to a 32 bit RISC-V 4 platform to provide fine-grained s...| CHERIoT Platform
(mirrored on GitHub)| sr.ht