w
July 22, 2022, 4:52 a.m. | Peter Sewell

Light Blue Touchpaper www.lightbluetouchpaper.org

In this blog post, we describe how we used rigorous engineering methods to provide high assurance of key security properties of CHERI architectures, with machine-checked mathematical proof, as well as to complement and support traditional design and development workflows, e.g. by automatically generating test suites. This shows that, by judicious use of rigorous semantics at design time, we can do much better than test-and-debug development.

academic papers architecture cheri design engineering programming-languages scale security security engineering

Senior Offensive Cyber Analyst

@ PeopleTec | HUNTSVILLE, AL, United States

Cyber Systems Administrator

@ Peraton | San Diego, CA, United States

Senior Security Analyst (SOC)

@ Accesa & RaRo | Cluj-Napoca, Romania

Level 1 SOC Analyst

@ Telefonica Tech | Dublin, United Kingdom

Cyberspace Intelligence Analyst

@ Peraton | Fort Meade, MD, United States

Technical Product Manager, Electronic Warfare

@ Anduril | Costa Mesa, California, United States