CHERI UNCHAINED: Generic Instruction and Register Control for CHERI Capabilities

Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

Abstract

The CHERI capability architecture is designed to implement the principle of least privilege at the hardware level, enabling fine-grain compartmentalization of resources in memory.
Besides memory, capability-enhanced processors like the ARM Morello SoC rely on traditional ring-based isolation for instruction and register control.
However, previous works have demonstrated that exploiting access to system registers or privileged instructions can allow attackers to break or bypass the memory isolation.
Furthermore, ring-based isolation is too coarse-grain for software isolation that aims to enforce least privilege.
This paper presents CHERI Unchained, a novel CHERI ISA extension that allows explicit management of (non-memory) hardware resources through software-controlled capabilities.
Specifically, we introduce the new concept of control capabilities, which enforce the principle of least privilege by restricting access to instructions and registers while following CHERI’s overarching design goals of provenance, integrity, and monotonicity.
Our design enables fine-grain resource management for both, pure-capability and legacy software.
Furthermore, CHERI Unchained has the potential to replace traditional ring-based protection entirely, thus reducing complexity while providing a higher degree of privilege control flexibility.
To demonstrate the feasibility of our design, we present a functional prototype based on the CHERI-QEMU simulator and evaluate the performance on the ARM Morello platform.
Extending generic software running on Morello with fine-grain hardware resource management incurs a worst-case performance overhead of 2.76%.
Additionally, we extensively analyze the security of all privilege-related mechanisms in our design, highlighting the flexibility of our generic approach.
Original languageEnglish
Title of host publicationAvailability, Reliability and Security
Subtitle of host publication20th International Conference, ARES 2025, Ghent, Belgium, August 11–14, 2025, Proceedings, Part II
EditorsMila Dalla Preda, Sebastian Schrittwieser, Vincent Naessens, Bjorn De Sutter
PublisherSpringer, Cham
Pages149–170
Number of pages22
ISBN (Electronic)978-3-032-00627-1
ISBN (Print)978-3-032-00626-4
DOIs
Publication statusPublished - 10 Aug 2025
Event20th International Conference on Availability, Reliability and Security, ARES 2025 - Ghent, Belgium
Duration: 11 Aug 202514 Aug 2025

Publication series

NameLecture Notes in Computer Science
Volume15993 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference20th International Conference on Availability, Reliability and Security, ARES 2025
Abbreviated titleARES 2025
Country/TerritoryBelgium
CityGhent
Period11/08/2514/08/25

Keywords

  • Capability Architecture
  • Compartmentalization
  • Memory Safety

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fields of Expertise

  • Information, Communication & Computing

Fingerprint

Dive into the research topics of 'CHERI UNCHAINED: Generic Instruction and Register Control for CHERI Capabilities'. Together they form a unique fingerprint.
  • AWARE - Hardware-Ensured Software Security

    Mangard, S. (Consortium manager resp. coordinator with external organisations) & Mangard, S. (Project manager on research unit)

    1/05/2230/04/25

    Project: Research project

Cite this