shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

254
active users

#memorysafety

0 posts0 participants0 posts today

One of our founding directors, Mike Eftimakis, sat down with Akshaya Asokan from Information Security Media Group (ISMG) to explore how CHERI is helping tackle one of cybersecurity’s biggest challenges: memory safety.

CHERI (Capability Hardware Enhanced RISC Instructions) is a hardware-based approach to security, designed to prevent around 70% of today’s common vulnerabilities. Backed by industry leaders and the UK government, we're working to ensure global adoption across the electronics supply chain.

Watch the interview to learn more about:

💠 How CHERI addresses memory safety issues
💠 Common hardware supply chain vulnerabilities
💠 Progress on adoption by chipmakers
💠 Scalability challenges associated with CHERI

🎥 Watch the full interview: bankinfosecurity.com/uks-cheri

The CHERI Alliance is all about bringing the computing world together to adopt CHERI security technology.

We’re a mix of industry partners, open-source contributors, researchers, and governments, all working to make CHERI more accessible and widely used.

Check out who’s already on board: cheri-alliance.org/member/

We’ve got active working groups tackling everything from software porting to system integration and standards - all helping the community adopt and build with CHERI more effectively. Take a look: cheri-alliance.org/who-we-are/

Curious? Keen to get involved? Here’s how to join us: cheri-alliance.org/memberships/

CHERI AllianceMembers Archive – CHERI Alliance

👋 Hey infosec.exchange! We’re the CHERI Alliance — excited to join the community!

🔐 We’re all about CHERI (Capability Hardware Enhanced RISC Instructions) — a powerful hardware-based approach to making memory safety and software security actually enforceable, by design.

💡 CHERI helps stop things like buffer overflows and use-after-free bugs before they cause trouble — with hardware-enforced protections built right into the architecture.

We’re here to:
- Share news about the CHERI community in general
- Talk about what our members are building with CHERI
- Connect with folks who care about deep, meaningful security improvements
Check us out 👉 cherialliance.org

Give us a follow if this sounds like your kind of thing!

Continued thread

[2/2] It is essentially two documents, a discussion of memory safety technologies and then specific CISA recommendations. Also included is a new chart providing the granular root-cause-analysis (RCA) for memory safety issues reported to Microsoft and a great appendix for those wanting more.

I would like to thank everyone who put work in on this. Of the many people who briefed us please reveal yourselves if you wish to be identified.

The TAC: Jeff Moss @thedarktangent Subcommittee Chair, DEF CON Communications. Dino Dai Zovi, CashApp. Luiz Eduardo @effffn, Aruba Threat Labs. Royal Hansen, Google. Isiah Jones, Applied Integrated Technologies. Kurt Opsahl @Kurt, Electronic Frontier Foundation. Stephen Schmidt, Amazon. Yan Shoshitaishvili, Arizona State University. Kevin Tierney, General Motors. Rachel Tobac @racheltobac, SocialProof Security. David Weston @dwizzzle, Microsoft.

From CISA: Eric Goldstein and Bob Lord @boblord

[1/2] Almost six months ago the Director of the Cybersecurity and Infrastructure Security Agency, Jen Easterly, directed the Technical Advisory Council (TAC) of the Cybersecurity Advisory Council (CSAC) to answer six questions around Memory Safety to help the department understand the challenges and opportunities of Memory Safe Systems Languages such as Rust, Go, and Swift.

DL/DR: Memory Safe Systems Languages are becoming mature, hyper-scale companies are doing incremental rewrites, there are additional protections that should be used in non-memory safe languages such as c++, and you should start to develop your roadmap. Please read the report. 😎

Since the TAC started working, Memory Safety has become a hot topic, with the NSA joining CISA to release "The Case for Memory Safe Roadmaps"

Last week the TAC submitted our final report at the quarterly public meeting and I'm pleased to link it here:
cisa.gov/sites/default/files/2

🎶 I checked her out, it was a Friday night
I used dark mode to get the feelin’ right
We started coding C, and shared some memory
But then I tried concurrent reads

And that’s about the time she threw a fault at me
Nobody likes you when your memory’s free
and are still pointing to that address space
What the hell is SIGSEGV?
My friends say I should memory safe
What’s my page again?
What’s my page again? 🎶

new post: the SUX Rule for safer code kellyshortridge.com/blog/posts

it’s short for Sandbox-free - Unsafe - eXogenous. If your code does all three of:
- running without a sandbox
- written in an unsafe language
- processing exogenous inputs

it’s certain your code SUX.

it’s basically me tweaking Chromium’s excellent Rule of Two because it conflicts with Star Wars lore (among other reasons I describe)