Projects per year
Abstract
The CHERI capability architecture is designed to implement the principle of least privilege at the hardware level, enabling fine-grain compartmentalization of resources in memory.
Besides memory, capability-enhanced processors like the ARM Morello SoC rely on traditional ring-based isolation for instruction and register control.
However, previous works have demonstrated that exploiting access to system registers or privileged instructions can allow attackers to break or bypass the memory isolation.
Furthermore, ring-based isolation is too coarse-grain for software isolation that aims to enforce least privilege.
This paper presents CHERI Unchained, a novel CHERI ISA extension that allows explicit management of (non-memory) hardware resources through software-controlled capabilities.
Specifically, we introduce the new concept of control capabilities, which enforce the principle of least privilege by restricting access to instructions and registers while following CHERI’s overarching design goals of provenance, integrity, and monotonicity.
Our design enables fine-grain resource management for both, pure-capability and legacy software.
Furthermore, CHERI Unchained has the potential to replace traditional ring-based protection entirely, thus reducing complexity while providing a higher degree of privilege control flexibility.
To demonstrate the feasibility of our design, we present a functional prototype based on the CHERI-QEMU simulator and evaluate the performance on the ARM Morello platform.
Extending generic software running on Morello with fine-grain hardware resource management incurs a worst-case performance overhead of 2.76%.
Additionally, we extensively analyze the security of all privilege-related mechanisms in our design, highlighting the flexibility of our generic approach.
Besides memory, capability-enhanced processors like the ARM Morello SoC rely on traditional ring-based isolation for instruction and register control.
However, previous works have demonstrated that exploiting access to system registers or privileged instructions can allow attackers to break or bypass the memory isolation.
Furthermore, ring-based isolation is too coarse-grain for software isolation that aims to enforce least privilege.
This paper presents CHERI Unchained, a novel CHERI ISA extension that allows explicit management of (non-memory) hardware resources through software-controlled capabilities.
Specifically, we introduce the new concept of control capabilities, which enforce the principle of least privilege by restricting access to instructions and registers while following CHERI’s overarching design goals of provenance, integrity, and monotonicity.
Our design enables fine-grain resource management for both, pure-capability and legacy software.
Furthermore, CHERI Unchained has the potential to replace traditional ring-based protection entirely, thus reducing complexity while providing a higher degree of privilege control flexibility.
To demonstrate the feasibility of our design, we present a functional prototype based on the CHERI-QEMU simulator and evaluate the performance on the ARM Morello platform.
Extending generic software running on Morello with fine-grain hardware resource management incurs a worst-case performance overhead of 2.76%.
Additionally, we extensively analyze the security of all privilege-related mechanisms in our design, highlighting the flexibility of our generic approach.
| Original language | English |
|---|---|
| Title of host publication | Availability, Reliability and Security |
| Subtitle of host publication | 20th International Conference, ARES 2025, Ghent, Belgium, August 11–14, 2025, Proceedings, Part II |
| Editors | Mila Dalla Preda, Sebastian Schrittwieser, Vincent Naessens, Bjorn De Sutter |
| Publisher | Springer, Cham |
| Pages | 149–170 |
| Number of pages | 22 |
| ISBN (Electronic) | 978-3-032-00627-1 |
| ISBN (Print) | 978-3-032-00626-4 |
| DOIs | |
| Publication status | Published - 10 Aug 2025 |
| Event | 20th International Conference on Availability, Reliability and Security, ARES 2025 - Ghent, Belgium Duration: 11 Aug 2025 → 14 Aug 2025 |
Publication series
| Name | Lecture Notes in Computer Science |
|---|---|
| Volume | 15993 LNCS |
| ISSN (Print) | 0302-9743 |
| ISSN (Electronic) | 1611-3349 |
Conference
| Conference | 20th International Conference on Availability, Reliability and Security, ARES 2025 |
|---|---|
| Abbreviated title | ARES 2025 |
| Country/Territory | Belgium |
| City | Ghent |
| Period | 11/08/25 → 14/08/25 |
Keywords
- Capability Architecture
- Compartmentalization
- Memory Safety
ASJC Scopus subject areas
- Theoretical Computer Science
- General Computer Science
Fields of Expertise
- Information, Communication & Computing
Fingerprint
Dive into the research topics of 'CHERI UNCHAINED: Generic Instruction and Register Control for CHERI Capabilities'. Together they form a unique fingerprint.Projects
- 1 Finished
-
AWARE - Hardware-Ensured Software Security
Mangard, S. (Consortium manager resp. coordinator with external organisations) & Mangard, S. (Project manager on research unit)
1/05/22 → 30/04/25
Project: Research project
Activities
- 1 Talk at conference or symposium
-
CHERI UNCHAINED: Generic Instruction and Register Control for CHERI Capabilities
Waser, M. (Speaker)
13 Aug 2025Activity: Talk or presentation › Talk at conference or symposium › Science to science