Skip to content
Discussion options

You must be logged in to vote

How realistic is this attack?

That depends a lot on the code and the threat model. We want CHERI (in general, and CHERIoT in particular) to be usable for software compartmentalisation. Part of our threat model is that you have arbitrary code provided by a third party and need to enforce memory safety when you run it in a compartment.

Even if you don't want memory safety as a building block for compartmentalisation, it's still quite a common attack vector. You have things like unions of pointers and integers, buffers with imprecise bounds with pointers after them, type-erased things with pointers, and so on. Lots of ways of tricking something into overwriting an integer with a pointer.

A…

Replies: 4 comments 1 reply

Comment options

You must be logged in to vote
0 replies
Comment options

You must be logged in to vote
1 reply
@davidchisnall
Comment options

Answer selected by SaiVK
Comment options

You must be logged in to vote
0 replies
Comment options

You must be logged in to vote
0 replies
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
3 participants