ABSTRACT
This paper describes the architecture and development of a secure heterogeneous RISC-V system with protection dedicated core that provides hardware mechanisms for establishing root-of-trust, monitoring and controlling the execution of the rest of the cores in the system. The focus is on the security core which serves as control unit for the rest of the computational processors.
- Musa G. Samaila, João B. F. Sequeiros, Tiago Simões, Mário M. Freire, Pedro R. M. Inácio, "IoT-HarPSecA: A Framework and Roadmap for Secure Design and Development of Devices and Applications in the IoT Space", IEEE Access, January 27, 2020Google ScholarCross Ref
- “How Secure Are RISC-V Chips?”, online: https://semiengineering.com/how-secure-are-risc-v-chips/, [February, 2023]Google Scholar
- TAO LU, “A Survey on RISC-V Security: Hardware and Architecture”, eprint arXiv:2107.04175, 2021Google Scholar
- “About RISC-V”, online: risc-v.org, [February, 2023]Google Scholar
- “Arm ® TrustZone ® Technology vs RISC-V MultiZone TM Security”, online: risc-v.org, April, 2019Google Scholar
- Nathan House, “The Complete Cyber Security Course, Volume I, HACKERS Exposed”, London: StationX, 2017Google Scholar
- Dan Meng, Rui Hou, Gang Shi, Bibo Tu, Aimin Yu, Ziyuan Zhu, Xiaoqi Jia and Peng Li,. “Security-first architecture: deploying physically isolated active security processors for safeguarding the future of computing”, Meng etal. Cybersecurity, 2018Google Scholar
- Trong-Thuc Hoang, Ckristian Duran, Ronaldo Serrano, Marco Sarmiento, Khai-Duy Nguyen, Akira Tsukamoto, Kuniyasu Suzaki, Cong-Kha Pham, "Trusted Execution Environment Hardware by Isolated Heterogeneous Architecture for Key Scheduling", IEEE Access, April 12, 2022Google Scholar
- Trong-Thuc Hoang, Ckristian Duran, Duc-Thinh Nguyen-Hoang1, Duc-Hung Le, Kuniyasu Suzaki, Cong-Kha Pham, "Quick Boot of Trusted Execution Environment With Hardware Accelerators", IEEE Access, March 13, 2020Google Scholar
- Suman Sau, Jawad Haj-Yahya, Ming Ming Wong, Kwok Yan Lam, Anupam Chattopadhyay, NTU, Singapore, "Survey of Secure Processors", 2017 International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation (SAMOS), DOI:10.1109/SAMOS.2017.8344637, July, 2017Google ScholarCross Ref
- Vinay B. Y. Kumar, Anupam Chattopadhyay, Jawad Haj-Yahya, Avi Mendelson , "ITUS: A Secure RISC-V System-on-Chip", 2019 32nd IEEE International System-on-Chip Conference (SOCC), DOI:10.1109/SOCC46988.2019.1570564307, September, 2019Google ScholarCross Ref
- “Hardware Root of Trust: Everything you need to know“, online: https://www.rambus.com/blogs/hardware-root-of-trust/, October 29, 2021, [February, 2023]Google Scholar
- A. Waterman, K. Asanovic, and J. Hauser, “The RISC-V Instruction Set Manual Volume II: Privileged Architecture, Document Version 1.12-draft,” RISC-V Foundation, Jul, 2022.Google Scholar
- "IEEE Standard for SystemVerilog—Unified Hardware Design, Specification, and Verification Language", IEEE Standards Association Corporate Advisory Group, 2017Google Scholar
- “RISC-V Software Ecosystem”, https://riscv.org/wp-content/uploads/2015/01/riscv-software-toolchain-workshop-jan2015.pdf, [March,2023]Google Scholar
- “The RISC-V ISA Simulator (Spike)”, https://chipyard.readthedocs.io/en/stable/Software/Spike.html, [March, 2023]Google Scholar
Index Terms
- Secure Heterogeneous Architecture based on RISC-V and root-of-trust
Recommendations
HECTOR-V: A Heterogeneous CPU Architecture for a Secure RISC-V Execution Environment
ASIA CCS '21: Proceedings of the 2021 ACM Asia Conference on Computer and Communications SecurityTo ensure secure and trustworthy execution of applications in potentially insecure environments, vendors frequently embed trusted execution environments (TEE) into their systems. Applications executed in this safe, isolated space are protected from ...
An Efficient Instruction Fetch Architecture for a RISC-V Soft Processor on an FPGA
HEART '19: Proceedings of the 10th International Symposium on Highly-Efficient Accelerators and Reconfigurable TechnologiesTo reduce the code size of application programs for RISC-V soft processors on an FPGA, it is desirable for the processor to support the RISC-V compressed instruction extension. In this paper, we implement an efficient instruction fetch unit. We clarify ...
Performance Evaluation of Various RISC Processor Systems: A Case Study on ARM, MIPS and RISC-V
Cloud Computing – CLOUD 2021AbstractRISC-V is a new instruction set architecture (ISA) that has emerged in recent years. Compared with previous computer instruction architectures, RISC-V has outstanding features such as simple instructions, modular instruction set and supporting ...
Comments