CHERI implementation

The only commercial implementation
of CHERI technology

Is your product secure enough? By using our CHERI-enabled processor core you can prevent up to 70% of potential attacks. And, we have done most of the work. We have added built-in, fine-grained memory protection by extending the RISC-V ISA with CHERI-based custom instructions. 

You can get access to a full software environment to take advantage of CHERI technology. You could even enhance the security of your existing products with a small effort, often through a simple code recompilation.

Codasip CHERI

It’s time to improve the security of your next design.

Reach out to us and we will contact you within 48 hours to learn more about your requirements.