Read the Digital Security by Design Mid Term Report (2023).
Funded and announced projects
LowRisc: Sunburst project
The Sunburst project improved the security of embedded devices by increasing the adoption of secure hardware.
LowRisc produced two types of development boards featuring capability-enhanced processors based on the CHERIoT (capability hardware extension to RISC-V for internet of things) technology, with the goal of getting this technology into the hands of engineers.
Read more about the Sunburst project.
Thales – RESAuto
The RESAuto project led by Thales UK demonstrated the quantified advantages of CHERI-based solutions in complex interconnected systems with sophisticated supply ecosystems and liability models.
RESAuto uses an Automotive Braking System integrated with a real-time monitoring and compliance system as its exemplar for demonstration.
Read more about RESAuto – AESIN.
Technology platform prototype
The Morello Board, developed by Arm and based on the University of Cambridge’s secure computer architecture, capability hardware enhanced RISC instructions (CHERI), introduced a new approach to block security vulnerabilities in modern computer systems. This made it harder to attack technology infrastructure and remotely take control.
The project also involved open-source software specialists Linaro and the University of Edinburgh.
Read more about Arm’s technology platform prototype.
Demonstrator projects
£13 million funding was allocated through UKRI’s Digital Security by Design Challenge to five collaborative projects which demonstrated the impact of new technologies. These projects used the DSbD technology platform prototype, the Morello Board.
THG
THG tested the benefits of DSbD technology to improve the security of e-commerce and enable the increased productivity and development of future world-leading services and products.
CyberHive
CyberHive developed a demonstrator and supporting framework of development tools to help digital computing infrastructure to become more resistant to attacks, both in the UK and around the world.
It also developed innovative new methods to secure the data being transmitted by applying layered encryption resistant to attack by quantum computers that is thus more resilient to near-term and future cyber-threats.
Beam Connectivity
Beam Connectivity demonstrated and reviewed the use of DSbD technologies for cyber critical and safety critical applications in the automotive sector.
Southern Gas
Southern Gas delivered an internet of things demonstrator in the utility industry. This use of DSbD technologies delivered an enhanced security solution for applicability within SGN critical national infrastructure.
ICETOPE
ICETOPE worked with industry standard bodies to address the lack of cooperation between information technology and operational technology. The aim was to help overcome the cybersecurity barrier for implementing effective Edge computing by harnessing the new security compartmentalisation features of the Morello platform.
Discribe: DSbD Social Science Hub+
Economic Development Research Council (ESRC) led the Digital Security by Design Social Science Hub+ as part of the DSbD Challenge.
A social science-led research programme, the DiScriBe Hub+, brought together social scientists, economists, computer scientists, and arts and humanities professionals for research, networking and engagement with the wider community.
The DiScriBe Hub+ provided interdisciplinary leadership to realise digital security by design, and addressed challenges by connecting social science to a hardware layer that rarely receives support or engagement from social science.
As a consequence, and a major outcome of the DiScriBE project, a vibrant, new community, with novel insights has been created that continue to apply and develop and implement new security-related developments.
Read more about the Discribe project.
EPSRC research projects
These EPSRC-led research projects have leveraged the DSbD technology hardware prototype (Morello Board) to work on a focused area within a selected and specified software stack or operating system or developer toolchain used by a digital system.
AppControl
Developed a formal, executable specification that every component of a mission-critical system-on-chip has to follow.
Read more about the AppControl project.
Capability Architectures in Trusted Execution (CAP-TEE)
Focused on capability architectures and trusted execution to protect safety and security-critical systems.
Read more about the CAP-TEE project.
Capabilities for Heterogeneous Accelerators (CAPcelerate)
Investigated how capability protection can be applied to systems containing heterogeneous accelerators for applications such as graphics, artificial intelligence, cryptography and networking.
Read more about the CAPcelerate project.
Capability-based Isolation for Cloud Native Applications (CloudCAP)
Developed capability-based cloud compartments that can express policies about the confidentiality and integrity of data, within and across components of a cloud stack and cloud native applications.
Read more about the CloudCap project.
CHERI for Hypervisors and Operating Systems (CHaOS)
Developed new hypervisor and operating-system software compartmentalisation models able to use the CHERI or Morello architectural primitives to improve compartmentalisation scalability.
Read more about the ChaOS project.
CapableVMs
Improved the security of high-performance programming language virtual machines (VMs) using CHERI hardware enforced capabilities.
Read more about the CapableVMs project.
Capability C (CapC)
Developed a new semantic definition of C that provides safety by default, enabling it to be compatible with the DSbD hardware and maximising security.
Read more about the CapC project.
Secure Code for Capability Hardware (SCorCH)
Developed a new software verification toolchain for capabilities to verify the Morello platform is used correctly, based on state-of-the-art static and dynamic software verification and theorem-proving techniques.
Read more about the SCorCH project.
Holistic Design of Secure Systems on Capability Hardware (HD-Sec)
Explored engineering challenges in establishing and formally verifying the relationship between application-level security requirements and secure software implementations running on capability hardware.
Read more about the HD-Sec project.