Latest from Embedded

100269668 © Ronstik | Dreamstime.com
promo_100269668__ronstik__dreamstime
377411649 © Elena Savitskaia - Dreamstime.com
377411649_elena_savitskaia__dreamstime
ID 168871800 © Thomas Reimer | Dreamstime.com
myths_dreamstime_l_168871800
ID 191915652 © Kenny Sk | Dreamstime.com
circuitboard_dreamstime_l_191915652
Codasip
65e896b988f459001eded7ac Promo Codasipcheritechnology

What’s the Difference Between Conventional Memory Protection and CHERI? (Download)

March 6, 2024

Read this article online.

Most semiconductor companies and OEMs take precautions around processor-based systems, which includes secure boot and encrypting communications of important data. However, relatively little attention has been given to memory safety vulnerabilities like buffer overflows or over-reads when designing systems on chip (SoCs). 

Such weaknesses have been exploited time and time again, usually at great cost for users and suppliers of systems. For decades, industry has created billions of lines of unsafe C & C++ code. However, addressing the resulting memory safety risks has been discussed little outside software groups.