A closer look at security verification for RISC-V processors
By Ashish Darbari, Axiomise
EDN (February 13, 2023)
Verifying the security of processors has become an essential step in the design of modern electronic systems. Users want to be sure that their consumer devices can’t be hacked, and that their personal and financial data is safe in the cloud. Effective security verification involves the processor hardware and the many layers of software running atop it.
This article discusses some of the challenges associated with hardware security verification and presents a formal-based methodology to provide a solution. Examples of designs implementing the popular RISC-V instruction set architecture (ISA) demonstrate the power of this approach.
![]() |
E-mail This Article | ![]() |
![]() |
Printer-Friendly Page |
|
Related Articles
- EAVS - Electra IC Advanced Verification Suite for RISC-V Cores
- Certifying RISC-V: Industry Moves to Achieve RISC-V Core Quality
- Debugging complex RISC-V processors
- Hardware-Assisted Verification: Ideal Foundation for RISC-V Adoption
- A formal-based approach for efficient RISC-V processor verification
New Articles
- Nexus: A Lightweight and Scalable Multi-Agent Framework for Complex Tasks Automation
- How the Ability to Manage Register Specifications Helps You Create More Competitive Products
- EAVS - Electra IC Advanced Verification Suite for RISC-V Cores
- Why RISC-V is a viable option for safety-critical applications
- Dimensioning in 3D space: Object Volumetric Measurement by Leveraging Depth Camera-based Reconstruction on NVIDIA Edge devices
Most Popular
- Nexus: A Lightweight and Scalable Multi-Agent Framework for Complex Tasks Automation
- System Verilog Assertions Simplified
- Synthesis Methodology & Netlist Qualification
- How the Ability to Manage Register Specifications Helps You Create More Competitive Products
- System Verilog Macro: A Powerful Feature for Design Verification Projects