Show simple item record

dc.contributor.authorWatson, Roberten
dc.contributor.authorNeumann, PGen
dc.contributor.authorMoore, Simonen
dc.contributor.editorShrobe, Hen
dc.contributor.editorShrier, DLen
dc.contributor.editorPentland, Aen
dc.date.accessioned2017-09-19T10:51:09Z
dc.date.available2017-09-19T10:51:09Z
dc.date.issued2017en
dc.identifier.isbn9780262535373en
dc.identifier.urihttps://www.repository.cam.ac.uk/handle/1810/267282
dc.description.abstractFor over two-and-a-half decades, dating to the first widespread commercial deployment of the Internet, commodity processor architectures have failed to provide robust and secure foundations for communication and commerce. This is in large part due to the omission of architectural features allowing efficient implementation of the Principle of Least Privilege, which dictates that software runs only with the rights it requires to operate [19, 20]. Without this support, the impact of inevitable vulnerabilities is multiplied as successful attackers gain easy access to unnecessary rights – and often, all rights – in software systems.en
dc.language.isoenen
dc.publisherMIT Pressen
dc.titleBalancing Disruption and Deployability in the CHERI Instruction-Set Architecture (ISA)en
dc.typeBook chapter
prism.publicationDate2017en
prism.publicationNameNew Solutions for Cybersecurityen
dc.identifier.doi10.17863/CAM.13286
rioxxterms.versionAMen
rioxxterms.licenseref.urihttp://www.rioxx.net/licenses/all-rights-reserveden
rioxxterms.licenseref.startdate2017en
dc.contributor.orcidMoore, Simon [0000-0002-2806-495X]
rioxxterms.typeBook chapteren
dc.identifier.urlhttps://mitpress.mit.edu/books/new-solutions-cybersecurityen


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record