Capability Hardware Enhanced RISC Instructions
As defined by the University of Cambridge, CHERI extends conventional hardware Instruction-Set Architectures (ISAs) with new architectural features to enable fine-grained memory protection and highly scalable software compartmentalization.
Increasing processor securitywith Custom Compute
*CVE stands for Common Vulnerability and Exposure as defined and explained here.
Award-winning commercial implementation of CHERI technology
Codasip X730 is the first commercially licensable CHERI implementation. It is based on our 64-bit high-performance A730 application core. Thanks to our unique Custom Compute methodology, we have extended the core with CHERI-based custom instructions, providing built-in, fine-grained memory protection.
Fine-grained memory protection
- 100% coverage in checking for memory errors using fine-grained memory protection against software attacks and programming errors
- Built-in CPU logic to check read/write permissions and validity of all memory accesses
- Unalterable hardware capabilities protect against known and future vulnerabilities
Simplicity of development
- Built-in unbreakable memory safety with CHERI technology
- Small increase in area and low impact on performance
- Increased security and cost saving simply through recompiling software with CHERI-aware compiler
- Ability to recompile only critical areas of code to reduce software effort to gain CHERI protection
- Fully backward compatible with standard RISC-V code
Blog
Read the latest Safety & Security Blogs
08 May 2024Industry
An open letter regarding Cyber Resilience of the UK’s Critical National Infrastructure
24 Apr 2024RISC-V
Is safety and security certification important?
28 Mar 2024Industry
Functional safety in the automotive supply chain
02 Nov 2023Safety & Security
Fine-grained memory protection
26 Oct 2023Safety & Security
Addressing memory safety with software
24 Oct 2023Safety & Security
Causes of memory unsafety
20 Oct 2023Safety & Security
Buffer bound vulnerabilities and their dangers
12 Oct 2023Safety & Security
Are common memory protection mechanisms adequate?
05 Oct 2023Safety & Security
Unsafe memory access is ruinous
Contact us
"*" indicates required fields