{"id":663459,"date":"2020-07-13T02:21:21","date_gmt":"2020-07-13T09:21:21","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/?post_type=msr-project&p=663459"},"modified":"2023-02-15T01:10:50","modified_gmt":"2023-02-15T09:10:50","slug":"portmeirion","status":"publish","type":"msr-project","link":"https:\/\/www.microsoft.com\/en-us\/research\/project\/portmeirion\/","title":{"rendered":"Portmeirion"},"content":{"rendered":"
\n\t
\n\t\t
\n\t\t\t\"Image\t\t<\/div>\n\t\t\n\t\t
\n\t\t\t\n\t\t\t
\n\t\t\t\t\n\t\t\t\t
\n\t\t\t\t\t\n\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\n

Portmeirion<\/h1>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/section>\n\n\n\n\n\n

Project Portmeirion aims to explore hardware-software co-design for security in the Azure general-purpose compute stack. We are working with major CPU vendors and academic collaborators to design new security features at both the architectural and microarchitectural level. This includes hardware-enforced memory safety for systems programming languages, fine-grained sandboxing, scalable enclave technologies, and infrastructure programming languages that can take advantage of all of these features.<\/p>\n\n\n\n

The project includes Microsoft Research\u2019s engagement with the Digital Security by Design Industrial Strategy Challenge fund (opens in new tab)<\/span><\/a>. This programme aims to provide hardware-backed solutions to the largest cybersecurity challenges facing the world today. We are actively collaborating with ARM, the University of Cambridge, and others on the CHERI (opens in new tab)<\/span><\/a> architecture extensions as embodied by ARM\u2019s Morello development platform.<\/p>\n\n\n\n

See also related projects; Project Verona<\/a> and Project Everest<\/a>.<\/p>\n\n\n\n

\n
snmalloc memory allocator<\/a><\/div>\n<\/div>\n\n\n","protected":false},"excerpt":{"rendered":"

Project Portmeirion aims to explore hardware-software co-design for security in the Azure general-purpose compute stack. We are working with major CPU vendors and academic collaborators to design new security features at both the architectural and microarchitectural level. This includes hardware-enforced memory safety for systems programming languages, fine-grained sandboxing, scalable enclave technologies, and infrastructure programming languages that can take advantage of all of these features.<\/p>\n","protected":false},"featured_media":663468,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"research-area":[13558],"msr-locale":[268875],"msr-impact-theme":[],"msr-pillar":[],"class_list":["post-663459","msr-project","type-msr-project","status-publish","has-post-thumbnail","hentry","msr-research-area-security-privacy-cryptography","msr-locale-en_us","msr-archive-status-active"],"msr_project_start":"","related-publications":[592006,1010430,593287,593302,593377,597883,652491,659370,695898,915369,916611,558288,1010307],"related-downloads":[925362,925371,925353],"related-videos":[],"related-groups":[],"related-events":[],"related-opportunities":[],"related-posts":[],"related-articles":[],"tab-content":[],"slides":[],"related-researchers":[{"type":"user_nicename","display_name":"Sylvan Clebsch","user_id":36368,"people_section":"People","alias":"syclebsc"},{"type":"user_nicename","display_name":"Boris Köpf","user_id":37857,"people_section":"People","alias":"bokoepf"},{"type":"user_nicename","display_name":"Robert Norton-Wright","user_id":39045,"people_section":"People","alias":"ronorton"},{"type":"user_nicename","display_name":"Matthew Parkinson","user_id":32838,"people_section":"People","alias":"mattpark"}],"msr_research_lab":[],"msr_impact_theme":[],"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/663459"}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-project"}],"version-history":[{"count":16,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/663459\/revisions"}],"predecessor-version":[{"id":919497,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/663459\/revisions\/919497"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media\/663468"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=663459"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=663459"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=663459"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=663459"},{"taxonomy":"msr-pillar","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-pillar?post=663459"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}