BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//cfp.riscv-europe.org//eu-summit-2026//talk//ZBWRKF
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-eu-summit-2026-ZBWRKF@cfp.riscv-europe.org
DTSTART;TZID=CET:20260609T141000
DTEND;TZID=CET:20260609T142000
DESCRIPTION:CHERI extends conventional ISAs with hardware-enforced capabili
 ties to provide fine-grained memory protection and its integration in RISC
 -V is gaining momentum with RVY. As adoption grows\, implementations must 
 be evaluated to ensure working CHERI protection mechanisms. We show that e
 xisting memory-corruption exploit implementations do not directly carry ov
 er to CHERI-enabled architectures\, and that observed exploit failures (i.
 e.\, unsuccessful exploits) do not necessarily imply effective protection.
  To resolve this ambiguity\, we propose a methodology that temporarily dis
 ables CHERI enforcement within a RISC-V VP. Comparing exploit behavior wit
 h and without CHERI enforcement under otherwise identical conditions makes
  it possible to distinguish exploit failure from effective CHERI protectio
 n.
DTSTAMP:20260522T163129Z
LOCATION:Poster Island A
SUMMARY:Distinguishing Exploit Failure from Effective CHERI Protection on R
 ISC-V - Daniel Große\, Manfred Schlägl\, Andreas Hinterdorfer
URL:https://cfp.riscv-europe.org/eu-summit-2026/talk/ZBWRKF/
END:VEVENT
END:VCALENDAR
