{"id":"https://openalex.org/W4411799844","doi":"https://doi.org/10.1109/icmcis64378.2025.11047961","title":"Biting the CHERI bullet: Blockers, Enablers and Security Implications of CHERI in Defence","display_name":"Biting the CHERI bullet: Blockers, Enablers and Security Implications of CHERI in Defence","publication_year":2025,"publication_date":"2025-05-13","ids":{"openalex":"https://openalex.org/W4411799844","doi":"https://doi.org/10.1109/icmcis64378.2025.11047961"},"language":"en","primary_location":{"id":"doi:10.1109/icmcis64378.2025.11047961","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icmcis64378.2025.11047961","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Conference on Military Communication and Information Systems (ICMCIS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045597082","display_name":"Shamal Faily","orcid":"https://orcid.org/0000-0002-2859-1143"},"institutions":[{"id":"https://openalex.org/I1339065421","display_name":"Defence Science and Technology Laboratory","ror":"https://ror.org/04jswqb94","country_code":"GB","type":"government","lineage":["https://openalex.org/I1306956679","https://openalex.org/I1339065421","https://openalex.org/I2802373619"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Shamal Faily","raw_affiliation_strings":["Defence Science &#x0026; Technology Laboratory,Portsdown West,UK"],"affiliations":[{"raw_affiliation_string":"Defence Science &#x0026; Technology Laboratory,Portsdown West,UK","institution_ids":["https://openalex.org/I1339065421"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5045597082"],"corresponding_institution_ids":["https://openalex.org/I1339065421"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.25342791,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/biting","display_name":"Biting","score":0.5370617508888245},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4863920509815216},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.42396730184555054},{"id":"https://openalex.org/keywords/biology","display_name":"Biology","score":0.17410150170326233},{"id":"https://openalex.org/keywords/ecology","display_name":"Ecology","score":0.10905206203460693}],"concepts":[{"id":"https://openalex.org/C2776039942","wikidata":"https://www.wikidata.org/wiki/Q4918888","display_name":"Biting","level":2,"score":0.5370617508888245},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4863920509815216},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.42396730184555054},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.17410150170326233},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.10905206203460693}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icmcis64378.2025.11047961","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icmcis64378.2025.11047961","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Conference on Military Communication and Information Systems (ICMCIS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W2045591401","https://openalex.org/W2055447821","https://openalex.org/W2062493711","https://openalex.org/W2792247140","https://openalex.org/W2906151105","https://openalex.org/W2964144088","https://openalex.org/W3025512357","https://openalex.org/W3037883157","https://openalex.org/W3142562566","https://openalex.org/W4289922184","https://openalex.org/W4319588686","https://openalex.org/W4376130811","https://openalex.org/W4394999111","https://openalex.org/W4399881573","https://openalex.org/W6712889098","https://openalex.org/W6768405391","https://openalex.org/W6894038392","https://openalex.org/W6921267520"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2152284887","https://openalex.org/W1720894513","https://openalex.org/W3133459378","https://openalex.org/W2023453526","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433"],"abstract_inverted_index":{"There":[0],"is":[1],"growing":[2],"interest":[3],"in":[4,185],"securing":[5],"the":[6,161,171,182],"hardware":[7,21,46],"foundations":[8],"software":[9,19,57],"stacks":[10],"build":[11],"upon.":[12],"However,":[13],"before":[14],"making":[15],"any":[16],"investment":[17],"decision,":[18],"and":[20,54,83,97,131,145,164,177],"supply":[22],"chain":[23,133],"stakeholders":[24],"require":[25],"evidence":[26],"from":[27,37,52,142],"realistic,":[28],"multiple":[29],"long-term":[30],"studies":[31],"of":[32,42,70,91,106,150],"adoption.":[33,154],"We":[34,66,86],"present":[35],"results":[36],"a":[38,75,117,147],"12":[39],"month":[40],"evaluation":[41],"one":[43],"such":[44],"secure":[45],"solution,":[47],"CHERI,":[48],"where":[49],"15":[50],"teams":[51],"industry":[53],"academia":[55],"ported":[56],"relevant":[58],"to":[59,61,152],"Defence":[60],"Arm's":[62],"experimental":[63],"Morello":[64],"board.":[65],"identified":[67,88,103],"six":[68],"types":[69,90,105],"blocker":[71],"inhibiting":[72],"adoption:":[73],"dependencies,":[74],"knowledge":[76,151],"premium,":[77],"missing":[78],"utilities,":[79],"performance,":[80],"platform":[81],"instability,":[82],"technical":[84],"debt.":[85],"also":[87],"three":[89],"enabler:":[92],"tool":[93,132],"assistance,":[94],"improved":[95],"quality,":[96],"trivial":[98],"code":[99],"porting.":[100],"Finally,":[101],"we":[102],"five":[104],"potential":[107],"vulnerability":[108],"that":[109],"CHERI":[110,143,148],"could,":[111],"if":[112],"not":[113],"appropriately":[114],"configured,":[115],"expand":[116],"system's":[118],"attack":[119],"surface:":[120],"state":[121],"leaks,":[122,124],"memory":[123],"use":[125],"after":[126],"free":[127],"vulnerabilities,":[128],"unsafe":[129],"defaults,":[130],"instability.":[134],"Future":[135],"work":[136],"should":[137],"remove":[138],"potentially":[139],"insecure":[140],"defaults":[141],"tooling,":[144],"develop":[146],"body":[149],"further":[153],"This":[155],"paper":[156],"was":[157],"originally":[158],"presented":[159],"at":[160],"NATO":[162],"Science":[163],"Technology":[165,174],"Organization":[166],"Symposium":[167],"(ICMCIS)":[168],"organized":[169],"by":[170],"Information":[172],"Systems":[173],"(1ST)":[175],"Scientific":[176],"Technical":[178],"Committee,":[179],"IST-209-RSY":[180],"-":[181],"ICMCIS,":[183],"held":[184],"Oeiras,":[186],"Portugal,":[187],"13\u201314":[188],"May":[189],"2025.":[190]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
