{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T21:38:00Z","timestamp":1775857080439,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T00:00:00Z","timestamp":1740441600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Engineering and Physical Sciences Research Council","award":["EP\\\/V000349\\\/1;EP\\\/X037525\\\/1"],"award-info":[{"award-number":["EP\\\/V000349\\\/1;EP\\\/X037525\\\/1"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,2,25]]},"DOI":"10.1145\/3708493.3712694","type":"proceedings-article","created":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T17:02:04Z","timestamp":1740502924000},"page":"180-191","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Secure Scripting with CHERIoT MicroPython"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-9310-8092","authenticated-orcid":false,"given":"Duncan","family":"Lowther","sequence":"first","affiliation":[{"name":"University of Glasgow, Glasgow, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4137-0353","authenticated-orcid":false,"given":"Dejice","family":"Jacob","sequence":"additional","affiliation":[{"name":"University of Glasgow, Glasgow, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-8819-0374","authenticated-orcid":false,"given":"Jacob","family":"Trevor","sequence":"additional","affiliation":[{"name":"University of Glasgow, Glasgow, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9462-6802","authenticated-orcid":false,"given":"Jeremy","family":"Singer","sequence":"additional","affiliation":[{"name":"University of Glasgow, Glasgow, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2025,2,25]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Robert NM Watson, and Hongyan Xia","author":"Amar Saar","year":"2023","unstructured":"Saar Amar, Tony Chen, David Chisnall, Felix Domke, Nathaniel Filardo, Kunyan Liu, Robert Norton-Wright, Yucong Tao, Robert NM Watson, and Hongyan Xia. 2023. CHERIoT: Rethinking security for low-cost embedded systems. Microsoft."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613424.3614266"},{"key":"e_1_3_2_1_3_1","unstructured":"AMD. 2024. AMD Artix TM 7 FPGAs. https:\/\/www.amd.com\/en\/products\/adaptive-socs-and-fpgas\/fpga\/artix-7.html#product-table"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3591195.3595278"},{"key":"e_1_3_2_1_5_1","unstructured":"David Chisnall. 2024. CHERIoT Programmers\u2019 Guide. https:\/\/cheriot.org\/book\/"},{"key":"e_1_3_2_1_6_1","volume-title":"Innovation and Technology","author":"Science Dept","year":"2024","unstructured":"Dept for Science, Innovation and Technology. 2024. CHERI adoption and diffusion research. https:\/\/www.gov.uk\/government\/publications\/cheri-adoption-and-diffusion-research\/cheri-adoption-and-diffusion-research"},{"key":"e_1_3_2_1_7_1","unstructured":"Damien P. George. 2024. py\/objint: Fix int.to_bytes() buffer size checks.. https:\/\/github.com\/micropython\/micropython\/pull\/13087"},{"key":"e_1_3_2_1_8_1","unstructured":"Damien P. George. 2024. Validate that the argument to indices() is an integer. https:\/\/github.com\/micropython\/micropython\/pull\/13039"},{"key":"e_1_3_2_1_9_1","unstructured":"Damien P. George. 2024. The MicroPython benchmark suite. https:\/\/github.com\/micropython\/micropython\/tree\/master\/tests\/perf_bench"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2023.3264676"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.48456\/tr-975"},{"key":"e_1_3_2_1_12_1","unstructured":"Michael Hunter. 2020. Microvium. https:\/\/github.com\/coder-mike\/microvium\/"},{"key":"e_1_3_2_1_13_1","volume-title":"Handbook of Terrorism Prevention and Preparedness, Alex P","author":"Jayakumar Shashi","year":"2023","unstructured":"Shashi Jayakumar. 2020. Cyber Attacks by Terrorists and other Malevolent Actors: Prevention and Preparedness With Three Case Studies on Estonia, Singapore, and the United States. In Handbook of Terrorism Prevention and Preparedness, Alex P. Schmid (Ed.). 871\u2013930. https:\/\/www.icct.nl\/sites\/default\/files\/2023-01\/Chapter-29-Handbook-.pdf"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3623759.3624550"},{"key":"e_1_3_2_1_15_1","unstructured":"LowRISC. 2024. Sonata Board Reference. https:\/\/lowrisc.github.io\/sonata-system\/doc\/architecture\/board.html"},{"key":"e_1_3_2_1_16_1","unstructured":"LowRISC. 2024. Sunburst Project. https:\/\/www.sunburst-project.org\/"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3623507.3623552"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3617651.3622991"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3571208"},{"key":"e_1_3_2_1_20_1","unstructured":"NIST. 2023. CVE-2023-7158. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-7158"},{"key":"e_1_3_2_1_21_1","unstructured":"NIST. 2024. CVE-2024-8948. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-8948"},{"key":"e_1_3_2_1_22_1","unstructured":"Robert Norton-Wright. 2023. CHERIoT. https:\/\/www.dcs.gla.ac.uk\/ jsinger\/cheritech23_slides\/rnortonwright_cheritech.pdf"},{"key":"e_1_3_2_1_23_1","unstructured":"Ruqi. 2024. XMake: A cross-platform build utility based on Lua. https:\/\/github.com\/xmake-io\/xmake\/"},{"key":"e_1_3_2_1_24_1","volume-title":"CAP-VMs: Capability-Based Isolation and Sharing in the Cloud. In 16th USENIX Symposium on Operating Systems Design and Implementation. 597\u2013612","author":"Sartakov Vasily A.","year":"2022","unstructured":"Vasily A. Sartakov, Llu\u00eds Vilanova, David Eyers, Takahiro Shinagawa, and Peter Pietzuch. 2022. CAP-VMs: Capability-Based Isolation and Sharing in the Cloud. In 16th USENIX Symposium on Operating Systems Design and Implementation. 597\u2013612. https:\/\/www.usenix.org\/conference\/osdi22\/presentation\/sartakov"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP60621.2024.00028"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3642974.3652282"},{"key":"e_1_3_2_1_27_1","volume-title":"The RISC-V instruction set manual","author":"Asanovi\u0107 Andrew","unstructured":"Waterman, Andrew and Asanovi\u0107, Krste. 2017. The RISC-V instruction set manual Volume I:User-Level ISA. https:\/\/riscv.org\/wp-content\/uploads\/2017\/05\/riscv-spec-v2.2.pdf"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2024.3396701"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.48456\/tr-986"},{"key":"e_1_3_2_1_30_1","unstructured":"Robert N. M. Watson Ben Laurie and Alex Richardson. 2021. Assessing the Viability of an Open-Source CHERI Desktop Software Ecosystem. https:\/\/www.capabilitieslimited.co.uk\/_files\/ugd\/f4d681_e0f23245dace466297f20a0dbd22d371.pdf"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.48456\/tr-987"},{"key":"e_1_3_2_1_32_1","unstructured":"White House. 2024. Back to the Building Blocks: A path toward secure and measurable software. https:\/\/www.whitehouse.gov\/wp-content\/uploads\/2024\/02\/Final-ONCD-Technical-Report.pdf"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2019.2914037"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2678373.2665740"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3672392"}],"event":{"name":"CC '25: 34th ACM SIGPLAN International Conference on Compiler Construction","location":"Las Vegas NV USA","acronym":"CC '25","sponsor":["SIGPLAN SIGPLAN Programming Languages"]},"container-title":["Proceedings of the 34th ACM SIGPLAN International Conference on Compiler Construction"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3708493.3712694","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3708493.3712694","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:09:54Z","timestamp":1750295394000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3708493.3712694"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,25]]},"references-count":35,"alternative-id":["10.1145\/3708493.3712694","10.1145\/3708493"],"URL":"https:\/\/doi.org\/10.1145\/3708493.3712694","relation":{},"subject":[],"published":{"date-parts":[[2025,2,25]]},"assertion":[{"value":"2025-02-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}