The UK government has opened a £1.5 million ($1.5m, €1.6m) competition to experiment with ARM’s Morello secure processor technology.
The competition from the Defence and Security Accelerator (DASA) will fund projects up to £100,000 using the Capability Hardware Enhanced RISC Instructions (CHERI) architecture extensions in the Arm’s Morello prototype System on Chip (SoC).
As well as new designs, projects will look at porting an existing codebase or tool such as a compiler into the Morello environment and strengthen its security by using the Morello enhanced security features, as well as redesigning an existing application to employ the fine grain software compartmentalisation in CHERI to provide more security.
The deadline to submit a proposal is midday 14 November 2022.
The ARM Morello Programme, funded by Digital Security by Design (DSbD), is a collaboration between academia, industry and government to research and create more secure hardware and software to improve built-in security. CHERI is the key underpinning technology that addresses memory safety issues and enables fine grain protection of applications.
Using this technology, Arm has designed a prototype SoC and development board, called the Morello board, the world’s first industrial quality implementation of CHERI. The Morello board is being distributed to industry and academia to test the prototype architecture to investigate and experiment on its capabilities.
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.