<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>morello Archives - Dynamic Devices Ltd</title>
	<atom:link href="https://www.dynamicdevices.co.uk/tag/morello/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.dynamicdevices.co.uk/tag/morello/</link>
	<description>Providing Embedded and IoT Solutions for 25 Years</description>
	<lastBuildDate>Wed, 19 Oct 2022 12:20:00 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
<site xmlns="com-wordpress:feed-additions:1">186818199</site>	<item>
		<title>Digital Security By Design &#8211; Morello CHERI</title>
		<link>https://www.dynamicdevices.co.uk/digital-security-by-design-morello-cheri/</link>
					<comments>https://www.dynamicdevices.co.uk/digital-security-by-design-morello-cheri/#respond</comments>
		
		<dc:creator><![CDATA[Cameron Swift]]></dc:creator>
		<pubDate>Mon, 10 Oct 2022 11:24:44 +0000</pubDate>
				<category><![CDATA[embedded-iot]]></category>
		<category><![CDATA[yocto-project]]></category>
		<category><![CDATA[cheri]]></category>
		<category><![CDATA[digital catapult]]></category>
		<category><![CDATA[dsbd]]></category>
		<category><![CDATA[dynamic devices]]></category>
		<category><![CDATA[embedded linux]]></category>
		<category><![CDATA[internet of things]]></category>
		<category><![CDATA[morello]]></category>
		<category><![CDATA[yocto]]></category>
		<guid isPermaLink="false">https://www.dynamicdevices.co.uk/?p=655</guid>

					<description><![CDATA[<p>The post <a href="https://www.dynamicdevices.co.uk/digital-security-by-design-morello-cheri/">Digital Security By Design &#8211; Morello CHERI</a> appeared first on <a href="https://www.dynamicdevices.co.uk">Dynamic Devices Ltd</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2 style="text-align: justify;">Introduction</h2>
<p style="text-align: justify;">We are proud to announce that we are taking part in the <a href="https://www.dsbd.tech/blogs/press-release-companies-across-the-uk-join-digital-security-by-design-to-validate-next-generation-cybersecurity-technology/">Digital Security by Design programme</a>!</p>
<p style="text-align: justify;">Digital Catapult is the UK authority on advanced digital technology. Along with other companies, we will be working with prototype cybersecurity technology which could massively affect the future of cybersecurity.</p>
<p style="text-align: justify;">Dynamic Devices have been given access to ARM&#8217;s Morello SoC and development board which is an industrial demonstrator of a capabiility architecture (CHERI) developed by ARM and Cambridge University. Morello implements a CHERI-extended ARMv8-A processor, GPU, peripherals and memory subsystem. This board will play a vital role for our research into the CHERI architecture.</p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_1">
				<div class="et_pb_column et_pb_column_1_2 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_image et_pb_image_0">
				
				
				
				
				<span class="et_pb_image_wrap has-box-shadow-overlay"><div class="box-shadow-overlay"></div><img data-recalc-dims="1" fetchpriority="high" decoding="async" width="1080" height="1440" src="https://i0.wp.com/www.dynamicdevices.co.uk/wp-content/uploads/2022/10/PXL_20221010_104324753-scaled.jpg?resize=1080%2C1440&#038;ssl=1" alt="arm morello board" title="PXL_20221010_104324753" srcset="https://i0.wp.com/www.dynamicdevices.co.uk/wp-content/uploads/2022/10/PXL_20221010_104324753-scaled.jpg?w=1920&ssl=1 1920w, https://i0.wp.com/www.dynamicdevices.co.uk/wp-content/uploads/2022/10/PXL_20221010_104324753-scaled.jpg?resize=225%2C300&ssl=1 225w, https://i0.wp.com/www.dynamicdevices.co.uk/wp-content/uploads/2022/10/PXL_20221010_104324753-scaled.jpg?resize=768%2C1024&ssl=1 768w, https://i0.wp.com/www.dynamicdevices.co.uk/wp-content/uploads/2022/10/PXL_20221010_104324753-scaled.jpg?resize=1152%2C1536&ssl=1 1152w, https://i0.wp.com/www.dynamicdevices.co.uk/wp-content/uploads/2022/10/PXL_20221010_104324753-scaled.jpg?resize=1536%2C2048&ssl=1 1536w, https://i0.wp.com/www.dynamicdevices.co.uk/wp-content/uploads/2022/10/PXL_20221010_104324753-scaled.jpg?resize=1080%2C1440&ssl=1 1080w, https://i0.wp.com/www.dynamicdevices.co.uk/wp-content/uploads/2022/10/PXL_20221010_104324753-scaled.jpg?resize=1280%2C1707&ssl=1 1280w, https://i0.wp.com/www.dynamicdevices.co.uk/wp-content/uploads/2022/10/PXL_20221010_104324753-scaled.jpg?resize=980%2C1307&ssl=1 980w, https://i0.wp.com/www.dynamicdevices.co.uk/wp-content/uploads/2022/10/PXL_20221010_104324753-scaled.jpg?resize=480%2C640&ssl=1 480w" sizes="(max-width: 1080px) 100vw, 1080px" class="wp-image-658" /></span>
			</div>
			</div><div class="et_pb_column et_pb_column_1_2 et_pb_column_2  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><blockquote>
<p style="text-align: justify;">The vast majority of cyber attacks exploit conventional hardware and software memory vulnerabilities. To overcome this issue, University of Cambridge researchers with colleagues at SRI International developed <strong>CHERI</strong> (Capability Hardware Enhanced RISC Instructions), a novel instruction set architecture that could stop two thirds of cyber attacks.</p>
<p style="text-align: justify;">As part of the project, Arm designed and built a prototype system on a chip (SoC) and demonstrator board, the <strong>Arm Morello</strong> board, which was made available to UK businesses for industrial evaluation earlier in 2022. The DSbD Technology Access Programme, managed by Digital Catapult, allows companies to experiment with the Morello board.</p>
<p style="text-align: justify;"><a href="https://www.digicatapult.org.uk/news-and-insights/press-releases/post/companies-across-the-uk-join-digital-security-by-design-to-validate-next-generation-cybersecurity-technology/">&#8211; digicatapult.org.uk</a></p>
</blockquote>
<p style="text-align: justify;">In the picture, you can see the ARM Morello board which we will be working on for the next 6 months.</p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_2">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_3  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_2  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2 style="text-align: justify;">Aim for the DSbD Programme</h2>
<p><span style="font-weight: 400;">In terms of what Dynamic Devices wants to accomplish with this programme, we hope to work with the existing Morello build support and integrate this to the greatest extent possible into the Yocto Embedded Linux build system resulting in an accrediated Yocto Compatible meta-cheri layer.</span></p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_3">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_4  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_3  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>What we&#8217;ve done so far</h2>
<p style="text-align: justify;">So far, we have:</p>
<ul>
<li style="text-align: justify;">Built <a href="https://www.cl.cam.ac.uk/research/security/ctsrd/cheri/cheribsd.html">Cheri-BSD</a> for Morello and QEMU.</li>
<li style="text-align: justify;">Installed Cheri-BSD onto the Morello board.</li>
<li style="text-align: justify;">Tested purecap/capabilities on Cheri-BSD with example tests and also developed our own programs to test the secure architecture.</li>
<li style="text-align: justify;">Researched on Linux/Android for Morello</li>
<li style="text-align: justify;">Built Android for Morello</li>
<li style="text-align: justify;">Researched into Yocto support for Cheri</li>
</ul></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_4">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_5  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_4  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Conclusion</h2>
<p style="text-align: justify;">We would like to offer a massive thank you to <a href="https://www.digicatapult.org.uk/">Digital Catapult</a> for enabling Dynamic Devices be a part of the Digital Security by Design programme. It is fantastic to be working alongside so many other innovative companies to further research these technologies which will undoubtedly shape the future of cybersecurity.</p>
<p style="text-align: justify;">This programme is 6 months long and we will provide updates as we progress our research into CHERI &amp; Morello.</p>
<p style="text-align: justify;">See related information for the DSbD here on <a href="https://twitter.com/DigiCatapult/status/1577622097613963264?s=20&amp;t=CXC6e0eB1zIVFe-P5bK5iw">Twitter</a> &amp; <a href="https://www.linkedin.com/feed/update/urn:li:activity:6983387754315292672">LinkedIn</a>.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://www.dynamicdevices.co.uk/digital-security-by-design-morello-cheri/">Digital Security By Design &#8211; Morello CHERI</a> appeared first on <a href="https://www.dynamicdevices.co.uk">Dynamic Devices Ltd</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.dynamicdevices.co.uk/digital-security-by-design-morello-cheri/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">655</post-id>	</item>
	</channel>
</rss>
