{"id":"https://openalex.org/W4376130811","doi":"https://doi.org/10.1109/mm.2023.3264676","title":"The Arm Morello Evaluation Platform\u2014Validating CHERI-Based Security in a High-Performance System","display_name":"The Arm Morello Evaluation Platform\u2014Validating CHERI-Based Security in a High-Performance System","publication_year":2023,"publication_date":"2023-05-01","ids":{"openalex":"https://openalex.org/W4376130811","doi":"https://doi.org/10.1109/mm.2023.3264676"},"language":"en","primary_location":{"id":"doi:10.1109/mm.2023.3264676","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mm.2023.3264676","pdf_url":null,"source":{"id":"https://openalex.org/S59697426","display_name":"IEEE Micro","issn_l":"0272-1732","issn":["0272-1732","1937-4143"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Micro","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006545282","display_name":"Richard Grisenthwaite","orcid":"https://orcid.org/0000-0002-0594-3206"},"institutions":[{"id":"https://openalex.org/I2801109035","display_name":"ARM (United Kingdom)","ror":"https://ror.org/04mmhzs81","country_code":"GB","type":"company","lineage":["https://openalex.org/I2801109035"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Richard Grisenthwaite","raw_affiliation_strings":["Arm Ltd, Cambridge, U.K"],"affiliations":[{"raw_affiliation_string":"Arm Ltd, Cambridge, U.K","institution_ids":["https://openalex.org/I2801109035"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024373219","display_name":"Graeme Barnes","orcid":null},"institutions":[{"id":"https://openalex.org/I2801109035","display_name":"ARM (United Kingdom)","ror":"https://ror.org/04mmhzs81","country_code":"GB","type":"company","lineage":["https://openalex.org/I2801109035"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Graeme Barnes","raw_affiliation_strings":["Arm Ltd, Cambridge, U.K"],"affiliations":[{"raw_affiliation_string":"Arm Ltd, Cambridge, U.K","institution_ids":["https://openalex.org/I2801109035"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013006563","display_name":"Robert N. M. Watson","orcid":"https://orcid.org/0000-0001-8139-8783"},"institutions":[{"id":"https://openalex.org/I241749","display_name":"University of Cambridge","ror":"https://ror.org/013meh722","country_code":"GB","type":"education","lineage":["https://openalex.org/I241749"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Robert N. M. Watson","raw_affiliation_strings":["University of Cambridge, Cambridge, U.K"],"affiliations":[{"raw_affiliation_string":"University of Cambridge, Cambridge, U.K","institution_ids":["https://openalex.org/I241749"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041439799","display_name":"Simon W. Moore","orcid":"https://orcid.org/0000-0002-2806-495X"},"institutions":[{"id":"https://openalex.org/I241749","display_name":"University of Cambridge","ror":"https://ror.org/013meh722","country_code":"GB","type":"education","lineage":["https://openalex.org/I241749"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Simon W. Moore","raw_affiliation_strings":["University of Cambridge, Cambridge, U.K"],"affiliations":[{"raw_affiliation_string":"University of Cambridge, Cambridge, U.K","institution_ids":["https://openalex.org/I241749"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083405043","display_name":"Peter Sewell","orcid":"https://orcid.org/0000-0001-9352-1013"},"institutions":[{"id":"https://openalex.org/I241749","display_name":"University of Cambridge","ror":"https://ror.org/013meh722","country_code":"GB","type":"education","lineage":["https://openalex.org/I241749"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Peter Sewell","raw_affiliation_strings":["University of Cambridge, Cambridge, U.K"],"affiliations":[{"raw_affiliation_string":"University of Cambridge, Cambridge, U.K","institution_ids":["https://openalex.org/I241749"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001050773","display_name":"Jonathan Woodruff","orcid":"https://orcid.org/0000-0003-3971-2681"},"institutions":[{"id":"https://openalex.org/I241749","display_name":"University of Cambridge","ror":"https://ror.org/013meh722","country_code":"GB","type":"education","lineage":["https://openalex.org/I241749"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Jonathan Woodruff","raw_affiliation_strings":["University of Cambridge, Cambridge, U.K"],"affiliations":[{"raw_affiliation_string":"University of Cambridge, Cambridge, U.K","institution_ids":["https://openalex.org/I241749"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5006545282"],"corresponding_institution_ids":["https://openalex.org/I2801109035"],"apc_list":null,"apc_paid":null,"fwci":4.0012,"has_fulltext":false,"cited_by_count":23,"citation_normalized_percentile":{"value":0.94918354,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"43","issue":"3","first_page":"50","last_page":"57"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11005","display_name":"Radiation Effects in Electronics","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8483833074569702},{"id":"https://openalex.org/keywords/arm-architecture","display_name":"ARM architecture","score":0.6544227600097656},{"id":"https://openalex.org/keywords/microarchitecture","display_name":"Microarchitecture","score":0.6336418390274048},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.6190125942230225},{"id":"https://openalex.org/keywords/codebase","display_name":"Codebase","score":0.5536629557609558},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5511847138404846},{"id":"https://openalex.org/keywords/computer-architecture","display_name":"Computer architecture","score":0.5091397166252136},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.46838027238845825},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.45640456676483154},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.43920302391052246},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.4003846049308777}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8483833074569702},{"id":"https://openalex.org/C26771161","wikidata":"https://www.wikidata.org/wiki/Q16980","display_name":"ARM architecture","level":2,"score":0.6544227600097656},{"id":"https://openalex.org/C107598950","wikidata":"https://www.wikidata.org/wiki/Q259864","display_name":"Microarchitecture","level":2,"score":0.6336418390274048},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.6190125942230225},{"id":"https://openalex.org/C51929080","wikidata":"https://www.wikidata.org/wiki/Q2425187","display_name":"Codebase","level":3,"score":0.5536629557609558},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5511847138404846},{"id":"https://openalex.org/C118524514","wikidata":"https://www.wikidata.org/wiki/Q173212","display_name":"Computer architecture","level":1,"score":0.5091397166252136},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.46838027238845825},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.45640456676483154},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.43920302391052246},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.4003846049308777},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mm.2023.3264676","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mm.2023.3264676","pdf_url":null,"source":{"id":"https://openalex.org/S59697426","display_name":"IEEE Micro","issn_l":"0272-1732","issn":["0272-1732","1937-4143"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Micro","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.550000011920929,"id":"https://metadata.un.org/sdg/9"}],"awards":[{"id":"https://openalex.org/G5860500101","display_name":"REMS: Rigorous Engineering for Mainstream Systems","funder_award_id":"EP/K008528/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G7401479227","display_name":null,"funder_award_id":"EP/K008528/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W1904738922","https://openalex.org/W2033320580","https://openalex.org/W2914947522","https://openalex.org/W2943086984","https://openalex.org/W3025512357","https://openalex.org/W3119047464","https://openalex.org/W3211661085"],"related_works":["https://openalex.org/W122453572","https://openalex.org/W2351011383","https://openalex.org/W2146879484","https://openalex.org/W4221002079","https://openalex.org/W2162875803","https://openalex.org/W1757458251","https://openalex.org/W3127172286","https://openalex.org/W2141090099","https://openalex.org/W2045325972","https://openalex.org/W1980898636"],"abstract_inverted_index":{"Memory":[0],"safety":[1,93],"issues":[2,40],"are":[3],"a":[4,33,128],"persistent":[5],"source":[6],"of":[7,56,82,105,121,131],"security":[8,99],"vulnerabilities,":[9],"with":[10],"conventional":[11],"architectures":[12],"and":[13,80,94,113,123,136,140],"the":[14,59,73,78,83,103,106,114,119,142],"C/C++":[15],"codebase":[16],"chronically":[17],"prone":[18],"to":[19,37,45,63,138],"exploitable":[20],"errors.":[21],"The":[22],"Capability":[23],"Hardware":[24],"Enhanced":[25],"RISC":[26],"Instructions":[27],"(CHERI)":[28],"research":[29],"project":[30],"has":[31],"explored":[32],"novel":[34],"architectural":[35,85],"approach":[36],"ameliorate":[38],"such":[39],"using":[41],"unforgeable":[42],"hardware":[43,86],"capabilities":[44],"implement":[46],"pointers.":[47],"Morello":[48,74,84,111,143],"is":[49],"an":[50],"Arm":[51,60,110],"experimental":[52],"platform":[53],"for":[54,67,90],"evaluation":[55],"CHERI":[57],"in":[58,133],"architecture":[61],"context":[62],"explore":[64,139],"its":[65],"potential":[66,89],"mass-market":[68],"adoption.":[69],"This":[70],"article":[71],"describes":[72],"Evaluation":[75],"Platform,":[76],"covering":[77],"motivation":[79],"functionality":[81],"extensions;":[87],"their":[88],"fine-grained":[91],"memory":[92],"software":[95],"compartmentalization;":[96],"formally":[97],"proven":[98],"properties;":[100],"impact":[101],"on":[102],"microarchitecture":[104],"high-performance,":[107],"out-of-order":[108],"multiprocessor":[109],"processor;":[112],"software-enablement":[115],"program":[116],"by":[117],"Arm,":[118],"University":[120],"Cambridge,":[122],"Linaro.":[124],"Together,":[125],"this":[126],"allows":[127],"wide":[129],"range":[130],"researchers":[132],"both":[134],"industry":[135],"academia":[137],"assess":[141],"platform.":[144]},"counts_by_year":[{"year":2025,"cited_by_count":11},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":7}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
