Skip to content

Commit c9c02e6

Browse files
committed
Replace relative paths for paper URLs.
1 parent 8810973 commit c9c02e6

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

_bibliography/publications.bib

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -11,8 +11,8 @@ @unpublished{dsbd2023compartmentalisationworkshop
1111
author = {Chisnall, David and Laurie, Ben},
1212
year = {2023},
1313
note= {Digital Security by Design All Hands},
14-
slides = {papers/2023-11-08-Compartmentalisation-Workshop.pptx},
15-
pdf = {papers/2023-11-08-Compartmentalisation-Workshop.pdf},
14+
slides = {https://cheriot.org/papers/2023-11-08-Compartmentalisation-Workshop.pptx},
15+
pdf = {https://cheriot.org/papers/2023-11-08-Compartmentalisation-Workshop.pdf},
1616
}
1717

1818

@@ -28,8 +28,8 @@ @inproceedings{cheriotmicro2023
2828
abstract = {The ubiquity of embedded devices is apparent. The desire for increased functionality and connectivity drives ever larger software stacks, with components from multiple vendors and entities. These stacks \emph{should} be replete with isolation and memory safety technologies, but existing solutions impinge upon development, unit cost, power, scalability, and/or real-time constraints, limiting their adoption and production-grade deployments. As memory safety vulnerabilities mount, the situation is clearly not tenable and a new approach is needed.
2929
3030
To slake this need, we present a novel adaptation of the CHERI capability architecture, co-designed with a green-field, security-centric RTOS. It is scaled for embedded systems, is capable of fine-grained software compartmentalization, and provides affordances for full inter-compartment memory safety. We highlight central design decisions and offloads and summarize how our prototype RTOS uses these to enable memory-safe, compartmentalized applications. Unlike many state-of-the-art schemes, our solution deterministically (not probabilistically) eliminates memory safety vulnerabilities while maintaining source-level compatibility. We characterize the power, performance, and area microarchitectural impacts, run microbenchmarks of key facilities, and exhibit the practicality of an end-to-end IoT application. The implementation shows that full memory safety for compartmentalized embedded systems is achievable without violating resource constraints or real-time guarantees, and that hardware assists need not be expensive, intrusive, or power-hungry.},
31-
pdf = {papers/2023-micro-cheriot-uarch.pdf},
32-
poster = {papers/2023-11-31-MIRCRO-CHERIoT-Poster.pdf}
31+
pdf = {https://cheriot.org/papers/2023-micro-cheriot-uarch.pdf},
32+
poster = {https://cheriot.org/papers/2023-11-31-MIRCRO-CHERIoT-Poster.pdf}
3333
}
3434

3535
@techreport{amar2023cheriot,

0 commit comments

Comments
 (0)