Javascript must be enabled to continue!
CWAMR: REIMAGINING A CAPABILITYBASED WEBASSEMBLY RUNTIME VIA CHERI-BASED COMPARTMENTALIZATION
View through CrossRef
WebAssembly (WASM) provides a language-neutral execution format widely deployed for cloud, edge, and embedded workloads. Its linear memory model and software-level sandboxing afford portability and a baseline of spatial isolation, yet they rely on dynamic bounds checks and page-based protections that incur overhead and remain susceptible to violations under speculative and out-of-order execution. Prior efforts to secure WASM for untrusted workloads frequently embed it within Trusted Execution Environments (TEEs) such as Intel SGX, introducing attestation, enclave management complexity, and exposure to shared-cache side channels, while still lacking hardware-enforced pointer provenance and bounds. This work presents cWAMR, the first WebAssembly runtime ported to leverage CHERI’s hardware-enforced capability model, integrating fine-grained bounds, permissions, and pointer provenance directly into the execution of WASM modules. We describe the adaptations made to the WAMR runtime, including a CHERI-sealed memory allocator, capability-restricted system interface (cWASI), and secure externref handling, enabling WASM workloads to execute within CHERI compartments without reliance on enclavewide isolation boundaries. Validation on the Arm Morello CHERI platform demonstrates correct execution of AoT-compiled and interpreted WASM modules under capability enforcement, preserving memory safety, compartmentalization, and integrity guarantees throughout runtime operation. Developed under the UK Digital Security by Design (DSbD) CHERI Morello program, this work establishes a practical path for integrating hardware capability systems with portable runtime environments. It lays the groundwork for future toolchain support, performance characterization, and broader deployment of capabilitybased security for untrusted code execution.
Academy & Industry Research Collaboration
Title: CWAMR: REIMAGINING A CAPABILITYBASED WEBASSEMBLY RUNTIME VIA CHERI-BASED COMPARTMENTALIZATION
Description:
WebAssembly (WASM) provides a language-neutral execution format widely deployed for cloud, edge, and embedded workloads.
Its linear memory model and software-level sandboxing afford portability and a baseline of spatial isolation, yet they rely on dynamic bounds checks and page-based protections that incur overhead and remain susceptible to violations under speculative and out-of-order execution.
Prior efforts to secure WASM for untrusted workloads frequently embed it within Trusted Execution Environments (TEEs) such as Intel SGX, introducing attestation, enclave management complexity, and exposure to shared-cache side channels, while still lacking hardware-enforced pointer provenance and bounds.
This work presents cWAMR, the first WebAssembly runtime ported to leverage CHERI’s hardware-enforced capability model, integrating fine-grained bounds, permissions, and pointer provenance directly into the execution of WASM modules.
We describe the adaptations made to the WAMR runtime, including a CHERI-sealed memory allocator, capability-restricted system interface (cWASI), and secure externref handling, enabling WASM workloads to execute within CHERI compartments without reliance on enclavewide isolation boundaries.
Validation on the Arm Morello CHERI platform demonstrates correct execution of AoT-compiled and interpreted WASM modules under capability enforcement, preserving memory safety, compartmentalization, and integrity guarantees throughout runtime operation.
Developed under the UK Digital Security by Design (DSbD) CHERI Morello program, this work establishes a practical path for integrating hardware capability systems with portable runtime environments.
It lays the groundwork for future toolchain support, performance characterization, and broader deployment of capabilitybased security for untrusted code execution.
Related Results
CWAMR: Reimagining A Capability based Webassembly Runtime Via Cheri-Based Compartmentalization
CWAMR: Reimagining A Capability based Webassembly Runtime Via Cheri-Based Compartmentalization
WebAssembly (WASM) provides a language-neutral execution format widely deployed for cloud, edge, and embedded workloads. Its linear memory model and software-level sandboxing affor...
Ada runtime environment working group—a framework for describing Ada runtime environment
Ada runtime environment working group—a framework for describing Ada runtime environment
The concept of a runtime environment to support program execution has always been associated with application software - it has only been with programming languages like Ada that t...
Runtime Verification on Robotics Systems
Runtime Verification on Robotics Systems
Runtime verification is a technique for generating monitors from formal specification of expected behaviors for the underlying system. It can be applied to automatically evaluate s...
Reviews Film
Reviews Film
Abstract
The Age of Shadows (2016) South Korea Director Jee-woon Kim Runtime 140 minutes
Backpack Full of Cash (2016) USA Director Sarah Mondale Runti...
COCOA: A Framework for Fine-scale Mapping Cell-type-specific Chromatin Compartmentalization Using Epigenomic Information
COCOA: A Framework for Fine-scale Mapping Cell-type-specific Chromatin Compartmentalization Using Epigenomic Information
Abstract
Chromatin compartmentalization and epigenomic modification are crucial factors in cell differentiation and diseases development. However...
Enhancement of Rabin-Karp Algorithmusing XOR Filter
Enhancement of Rabin-Karp Algorithmusing XOR Filter
Purpose–Thestudy aims to enhance the Rabin-Karp Algorithm that underlinesthe problem encountered wherein the algorithm’s runtimeperformanceis affected due tothe continuous rap...
An Optimised Hoffman Algorithm for Testing Linear Code Equivalency
An Optimised Hoffman Algorithm for Testing Linear Code Equivalency
The Hoffman’s algorithm to test equivalency of linear codes is one of the techniques that have been used over the years; it is achieved by a comparison of codewords of the linear c...
R2U2: Tool Overview
R2U2: Tool Overview
R2U2 (Realizable, Responsive, Unobtrusive Unit) is an extensible framework for runtime System Health Management (SHM) of cyber-physical systems. R2U2 can be run in hardware (e.g., ...

