Security Analysis of CHERI

References:

Heap Attacks

Metadata Corruption and Type Confusion Attack

  • Assumption: the metadata is corrupted in some way.

  • Having malloc return that same allocation multiple times or returning overlapping allocations.

Examples:

  • “Block size attack”:
  • “Google Project Zero (GPZ) exploit”:
    • creates overlapping chunks with only an off-by-one of a null byte.

Pros

MSRC 43%/70% defensed

More

Created Feb 14, 2022 // Last Updated Feb 15, 2022

If you could revise
the fundmental principles of
computer system design
to improve security...

... what would you change?