IDEAS home Printed from https://ideas.repec.org/a/sae/joudef/v23y2026i1p147-175.html

Capability hardware enhanced instructions and artificial intelligence bill of materials in trustworthy artificial intelligence systems: analyzing cybersecurity threats, exploits, and vulnerabilities in new software bills of materials with artificial intelligence

Author

Listed:
  • Petar Radanliev
  • Omar Santos
  • Alistair Brandon-Jones

Abstract

Integrating Capability-based Hierarchical Embedded RISC Instructions (CHERI) with the Artificial Intelligence (AI) Bill of Materials (AI BOMs) aims to enhance security and transparency in generative AI systems. With the increasing prevalence of AI and machine learning (ML), greater transparency and traceability are essential. This study introduces an analysis to explore how CHERI’s advanced security features can improve the reliability and transparency of AI BOMs, significantly contributing to the overall security of AI and ML technologies. The research employs a multi-faceted approach, combining theoretical analysis with practical evaluations. It begins with a comprehensive review of the existing literature on AI BOMs and CHERI, followed by an in-depth examination of cybersecurity threats, exploits, and vulnerabilities in new Software Bills of Materials (SBOMs). The study leverages AI methodologies, including data analysis techniques and AI-driven simulations, to assess the impact of integrating CHERI’s security features into AI BOMs. The study analyzes how CHERI and AI BOMs can enhance AI system security. The objectives include evaluating the role of AI BOMs in ensuring trust and quality in AI systems, assessing the efficacy of CHERI’s security features in mitigating cybersecurity threats, and identifying and analyzing cybersecurity threats, exploits, and vulnerabilities in SBOMs using AI techniques. The findings demonstrate that integrating CHERI with AI BOMs significantly enhances the security and transparency of AI systems. This integration helps identify and mitigate specific threats and vulnerabilities, improves trust and security in AI systems, and shows the potential of AI-driven methodologies in enhancing the security of SBOMs. By combining CHERI with AI BOMs, a promising pathway is established for creating more secure and transparent AI systems, addressing current cybersecurity challenges, and paving the way for future advancements in AI and ML technologies.

Suggested Citation

  • Petar Radanliev & Omar Santos & Alistair Brandon-Jones, 2026. "Capability hardware enhanced instructions and artificial intelligence bill of materials in trustworthy artificial intelligence systems: analyzing cybersecurity threats, exploits, and vulnerabilities i," The Journal of Defense Modeling and Simulation, , vol. 23(1), pages 147-175, January.
  • Handle: RePEc:sae:joudef:v:23:y:2026:i:1:p:147-175
    DOI: 10.1177/15485129241267919
    as

    Download full text from publisher

    File URL: https://journals.sagepub.com/doi/10.1177/15485129241267919
    Download Restriction: no

    File URL: https://libkey.io/10.1177/15485129241267919?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    More about this item

    Keywords

    ;
    ;
    ;
    ;

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:sae:joudef:v:23:y:2026:i:1:p:147-175. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: SAGE Publications (email available below). General contact details of provider: .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.