{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T04:05:44Z","timestamp":1751429144100,"version":"3.41.0"},"reference-count":42,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T00:00:00Z","timestamp":1747094400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T00:00:00Z","timestamp":1747094400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,5,13]]},"DOI":"10.1109\/icmcis64378.2025.11047961","type":"proceedings-article","created":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T17:36:43Z","timestamp":1751305003000},"page":"1-9","source":"Crossref","is-referenced-by-count":0,"title":["Biting the CHERI bullet: Blockers, Enablers and Security Implications of CHERI in Defence"],"prefix":"10.1109","author":[{"given":"Shamal","family":"Faily","sequence":"first","affiliation":[{"name":"Defence Science &#x0026; Technology Laboratory,Portsdown West,UK"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyac009"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3424302.3431245"},{"volume-title":"Shifting the Balance of Cybersecurity Risk: Principles and Approaches for Secure by Design Softwar","year":"2023","key":"ref3"},{"volume-title":"Back to the Building Blocks: A Path towards Secure and Measurable Software","year":"2024","key":"ref4"},{"volume-title":"A proactive approach to more secure code","year":"2019","key":"ref5"},{"volume-title":"Morello Prototype Architecture Overview User Guide","year":"2023","key":"ref6"},{"key":"ref7","article-title":"An Introduction to CHERI","volume-title":"University of Cambridge, Tech. Rep. UCAM-CL-TR-941","author":"Watson","year":"2019"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00098"},{"volume-title":"CHERI C\/C++ Programming Guide","year":"2020","author":"Watson","key":"ref9"},{"volume-title":"Arm A-Profile Architecture De-velopments 2018: Armv8.5-A","year":"2018","author":"Gretton-Dann","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2024.3396701"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2023.3264676"},{"volume-title":"Arm Architecture Reference Manual Supplement - Morello for A-profile Architecture","year":"2022","key":"ref13"},{"key":"ref14","article-title":"Cheriot: Rethinking security for low-cost embedded systems","volume-title":"Microsoft, Tech. Rep. MSR-TR-2023\u20136","author":"Amar","year":"2023"},{"volume-title":"cheriot-ibex github repository","year":"2024","key":"ref15"},{"volume-title":"Sonata System Documentation","year":"2024","key":"ref16"},{"volume-title":"Digital Security by Design website","year":"2021","key":"ref17"},{"key":"ref18","first-page":"39:1","article-title":"Rust for Morello: Always-On Memory Safety, Even in Unsafe Code","volume-title":"37th Euro-pean Conference on Object-Oriented Programming (ECOOP 2023), ser. Leibniz International Proceedings in Informatics (LIPlcs)","volume":"263","author":"Harris","year":"2023"},{"volume-title":"CHERI Clang\/LLVM and LLD","year":"2019","key":"ref19"},{"volume-title":"CheriBSD website","year":"2024","key":"ref20"},{"volume-title":"Morello Linux","year":"2024","key":"ref21"},{"volume-title":"CHERI within Defence and Security: Competition Document","year":"2022","key":"ref22"},{"key":"ref23","doi-asserted-by":"crossref","DOI":"10.4135\/9781452230153","volume-title":"Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory","author":"Corbin","year":"2008"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1108\/09685221011095254"},{"key":"ref25","first-page":"233","article-title":"Ethical Dilemmas and Dimensions in Penetration Testing","volume-title":"Proceedings of the Ninth International Symposium of Human Aspects of Information Security & Assurance","author":"Faily","year":"2015"},{"volume-title":"Technology Access Programme web site","year":"2024","key":"ref26"},{"volume-title":"CWE-416: Use After Free","year":"2023","key":"ref27"},{"volume-title":"CWE-284: Improper Access Control","year":"2023","key":"ref28"},{"key":"ref29","first-page":"2509","article-title":"\u2019I wouldn\u2019t want my unsafe code to run my pacemaker\u201d: An interview study on the use, comprehension, and perceived risks of unsafe rust","volume-title":"Proceedings of the 32nd USENIX Security Symposium","author":"Holtervennhoff","year":"2023"},{"volume-title":"Digital Security by Design: How it works","year":"2021","key":"ref30"},{"volume-title":"2023 CWE Top 10 KEV Weaknesses","year":"2023","key":"ref31"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3620665.3640416"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.56021\/9780801828737"},{"volume-title":"Using DSbD in practice; Is it a piece of CHERI-cake?","year":"2023","author":"Alhindi","key":"ref34"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1719030.1719050"},{"volume-title":"Stack overflow community website","year":"2024","key":"ref36"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.31"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3171533.3171539"},{"volume-title":"Market for Lemons wikipedia entry","year":"2024","key":"ref39"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1126\/science.1130992"},{"article-title":"Software Considerations in Airborne Systems and Equipment Certification","volume-title":"RTCA, Tech. Rep. DO-178C","year":"2011","key":"ref41"},{"volume-title":"CHERI Standards Compliance (STONE)","year":"2021","author":"Tudor","key":"ref42"}],"event":{"name":"2025 International Conference on Military Communication and Information Systems (ICMCIS)","start":{"date-parts":[[2025,5,13]]},"location":"Oerias, Portugal","end":{"date-parts":[[2025,5,14]]}},"container-title":["2025 International Conference on Military Communication and Information Systems (ICMCIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11047255\/11047555\/11047961.pdf?arnumber=11047961","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T05:42:06Z","timestamp":1751348526000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11047961\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,13]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/icmcis64378.2025.11047961","relation":{},"subject":[],"published":{"date-parts":[[2025,5,13]]}}}