This repository contains code examples and proof of concepts that showcase the security feature set of CHERI.
The CHERI Exceptions Demo
showcases the translation of CHERI exceptions into Ada exception and the handling of these.
The Return Oriented Programming Demo evaluates the impact of CHERI's security mechanisms on exploit techniques such as return oriented programming.
The Heap Corruption Demo dives deeper into the architecure of a CHERI application to show the limits of CHERI's protection mechanisms.
The CheriBSD Heap Corruption Demo applies the bare metal heap corruption to an application running on CheriBSD. It also evaluates the effect of CheriBSD's compartmentalization feature on that demo.