Skip to main content
Research at AGIACC

Research at AGIACC

6 mins

The hardware-assisted memory safety landscape
#

Memory safety vulnerabilities account for roughly 70% of exploitable defects in much of the published industry data. Software mitigations – sanitizers, canaries, ASLR, CFI – still matter, but they share a structural weakness: they execute alongside the code they protect and can be defeated by capable attackers.

Hardware-assisted designs move parts of the contract into the ISA, where software cannot simply disable enforcement. The first part of this page is a primer (aligned with our Technology – Memory safety series): MTE, PAC, CET, MPX, and CHERI. The closing section is explicit about AGIACC as a new company: we adopt a full protection spectrum from software runtime hardening (SafeClaw) through confidential computing (TEE-based AI protection) to CHERI-class capability platforms as our hardware story. We stand on extensive prior university, government, and industry work; our contribution is to compose these technologies into deployable AI security infrastructure.

Why funders should care: the winner in trusted AI infrastructure is unlikely to be the loudest model company. It is more likely to be the team that solves the hard platform problems others eventually depend on.


Technology Comparison
#

TechnologyVendorSafety ScopeDetectionOverheadDeployment Status
Arm MTEArmSpatial + temporalProbabilistic (4-bit tags)~3–5%Pixel 8+, iPhone 17, AmpereOne
Arm PACArmControl flow integrityCryptographic signing~1%All ARMv8.3+ devices (billions)
Intel CETIntelControl flow integrityShadow stack + IBT~1%Tiger Lake (11th gen+)
Intel MPXIntelSpatial onlyBounds registers~50%Deprecated (removed 10th gen)
CHERICambridge / Arm / RISC-VSpatial + temporal + compartmentalizationDeterministic capabilities~2–5%Morello (research), CHERIoT, ICENI

Arm MTE (Memory Tagging Extension)
#

Arm’s MTE, introduced in ARMv9, is the most widely deployed hardware memory safety technology. It associates a 4-bit tag with every 16-byte memory granule and every pointer. On each access, hardware compares tags – a mismatch signals a violation.

Strengths: Low overhead, suitable for always-on production deployment. Deployed at scale in Google Pixel and Apple iPhone.

Limitations: Probabilistic (6.7% bypass probability per attempt), vulnerable to tag leakage (CVE-2025-0072 demonstrated MTE bypass via Mali GPU driver), 16-byte granularity misses small overflows.


Arm PAC (Pointer Authentication Codes)
#

Available since ARMv8.3, PAC cryptographically signs pointers using unused upper bits. Before a pointer is dereferenced, its signature is verified – tampered pointers trigger a fault.

Strengths: Near-zero overhead, already shipping in billions of devices, effective against ROP/JOP attacks.

Limitations: Does not enforce bounds – a valid pointer can still access out-of-bounds memory. Signing oracle attacks can forge valid PACs under certain conditions.


Intel CET (Control-flow Enforcement Technology)
#

CET provides two complementary mechanisms: a Shadow Stack (hardware-maintained copy of return addresses, detecting ROP) and Indirect Branch Tracking (IBT, requiring indirect jumps to land on ENDBRANCH instructions, detecting JOP).

Strengths: Low overhead, transparent to most software, effective against control flow hijacking.

Limitations: Only protects control flow – does not prevent data-only attacks, buffer overflows, or use-after-free. Coarse-grained IBT is being actively researched for advanced bypasses (CFOP techniques).


Intel MPX – A Cautionary Tale
#

Intel MPX (2015–2019) was an ambitious attempt at hardware bounds checking. It added dedicated bounds registers and instructions for spatial safety. However, it suffered ~50% performance overhead, high memory consumption for bounds tables, and was eventually found to be bypassable via Meltdown. Intel removed MPX support from 10th-generation processors.

Lesson learned: Hardware memory safety must be architecturally sound, low-overhead, and integrated into the memory model – not bolted on as an afterthought.


CHERI: The Comprehensive Approach
#

CHERI (Capability Hardware Enhanced RISC Instructions), developed since 2010 by the University of Cambridge and SRI International, takes a fundamentally different approach. Instead of adding checks alongside existing pointers, CHERI replaces pointers with capabilities – 128-bit unforgeable tokens that encode bounds, permissions, and validity.

Why CHERI Stands Apart
#

PropertyMTEPACCETCHERI
Spatial safetyProbabilisticNoNoDeterministic
Temporal safetyProbabilisticNoNoDeterministic (revocation)
Control flow integrityNoYesYesYes (via sealed capabilities)
CompartmentalizationNoNoNoYes (fine-grained, in-process)
Secret-freeNo (tags are secrets)No (keys are secrets)YesYes
Bypassable via leaksYesPartiallyNoNo

Key Hardware Platforms
#

PlatformBase ISATargetStatus
Arm MorelloAArch64High-performance, researchUK DSbD research boards
Microsoft CHERIoTRISC-VIoT, embeddedActive development, LowRisc Sunburst
SCI ICENIRISC-VSecure 32-bit microcontrollersCommercial product
CHERI-RISC-VRISC-VGeneral-purposeFormal specs, FPGA, RISC-V SIG

Ecosystem and Standardisation
#

The CHERI Alliance
#

Formed in 2024, the CHERI Alliance unites processor IP vendors, OS developers, toolchain maintainers, and system integrators around bringing CHERI to commercial deployment. The Alliance provides interoperability testing frameworks and coordinates standardisation.

RISC-V Standardisation
#

A dedicated CHERI Special Interest Group within RISC-V International is working to formalise CHERI as part of the RISC-V ISA specification. The open, vendor-neutral nature of RISC-V provides a future-proof foundation across embedded, edge, and datacenter markets.

UK Digital Security by Design (DSbD)
#

The UK government’s flagship programme has funded:

  • Arm Morello – High-performance CHERI demonstrator
  • LowRisc Sunburst – CHERIoT development boards
  • RESAuto – CHERI-secured automotive systems
  • DEFGRID – CHERI-secured utility infrastructure
  • Multiple industrial demonstrators in healthcare, telecoms, and defence

International Policy Endorsement
#

Hardware-enforced memory safety has gained recognition at the highest policy levels:

  • The White House (2024) endorsed CHERI as a hardware solution for memory safety, citing the impracticality of rewriting all legacy code.
  • Chinese National Standards specify chip-level trusted computing as the foundation for AI infrastructure security (AI Computing Platform Security Framework).
  • EU AI Act requires demonstrable security measures for high-risk AI systems, creating regulatory pull for hardware-enforced approaches.

AGIACC’s research focus (near-term agenda)
#

We work at the intersection of capability hardware, confidential computing, AI safety, and autonomous / embodied systems. Our agenda spans the full protection spectrum:

SafeClaw and AI agent security
#

  • Runtime hardening patterns – Plugin isolation architectures, prompt injection detection methods, and tamper-evident audit designs for AI agent deployments
  • Threat modelling for agentic AI – Systematic analysis of attack surfaces when AI agents gain tool use, hardware control, and multi-platform access

Confidential AI computing
#

  • TEE integration for AI inference – Practical deployment patterns for Intel TDX, AMD SEV-SNP, and NVIDIA Confidential Computing in AI pipelines
  • Attestation architectures – Composite CPU+GPU attestation, secure key release, and zero-trust verification for multi-tenant AI infrastructure
  • Performance characterisation – Benchmarking TEE overhead on real AI workloads across hardware generations

CHERI and embodied AI
#

  • Compartment models for robotics – Runtime policies and integration patterns for agents, perception stacks, and edge inference on CHERI silicon
  • Lifecycle integrity (“AI BOM”) – Linking attestation, provenance, and update discipline across models, firmware, and dependencies
  • Toolchain realism – Contributing to compiler, debug, and verification paths that make capability code shippable

Composed defences
#

  • Multi-layer security – When and how to compose software hardening, TEE-based confidential computing, and CHERI hardware capabilities
  • MTE/PAC + CHERI – When probabilistic mitigations and deterministic capabilities should coexist
  • Measurement and overhead – Honest benchmarking on workloads that matter (latency, power, toolchain friction)

We collaborate with universities, programmes such as DSbD, and industry partners rather than working in isolation. Credibility comes from technical precision and reproducible claims. The commercial objective is straightforward: build a defensible security platform for AI systems that spans from software runtime hardening through confidential computing to hardware capability architectures.