Sử dụng Formal cho bảo mật RISC-V

Why microarchitectures and custom coding on low-cost chips are a growing source of concern.

popularity

Finding and closing up security holes is becoming more important as chips are used in safety- and mission-critical applications, but it’s increasingly important for chips designed for much less costly devices, where the selling price typically doesn’t warrant a significant investment in security. The problem is these devices are connected to some of the same networks, and any access points for hackers can compromise a much larger system. This has been a particular concern for RISC-V chips, in which the source code for the instruction set architecture can be modified by the user. Ashish Darbari, CEO of Axiomise, explains how formal verification can be in collaboration with the new Capability Hardware Enhanced RISC Instruction for Internet of Things (CHERIoT), how microarchitectures can compromise entire systems, and why custom instructions in RISC-V make security more difficult.

Alternative Text

Ed Sperling

  (all posts)

Ed Sperling is the editor in chief of Semiconductor Engineering.

source

Facebook Comments Box

Trả lời

Email của bạn sẽ không được hiển thị công khai. Các trường bắt buộc được đánh dấu *