A Survey on RISC-V Security: Hardware and Architecture

07/09/2021
by   Tao Lu, et al.
0

The Internet of Things (IoT) is an ongoing technological revolution. Embedded processors are the processing engines of smart IoT devices. For decades, these processors were mainly based on the Arm instruction set architecture (ISA). In recent years, the free and open RISC-V ISA standard has attracted the attention of industry and academia and is becoming the mainstream. Data security and user privacy protection are common challenges faced by all IoT devices. In order to deal with foreseeable security threats, the RISC-V community is studying security solutions aimed at achieving a root of trust (RoT) and ensuring that sensitive information on RISC-V devices is not tampered with or leaked. Many RISC-V security research projects are underway, but the academic community has not yet conducted a comprehensive survey of RISC-V security solutions. In order to fill this research gap, this paper presents an in-depth survey on RISC-V security technologies. This paper summarizes the representative security mechanisms of RISC-V hardware and architecture. Based on our survey, we predict the future research and development directions of RISC-V security. We hope that our research can inspire RISC-V researchers and developers.

READ FULL TEXT

page 3

page 5

page 8

research
03/13/2019

Security, Privacy and Trust for Smart Mobile-Internet of Things (M-IoT): A Survey

With an enormous range of applications, Internet of Things (IoT) has mag...
research
05/17/2021

Microservices in IoT Security: Current Solutions, Research Challenges, and Future Directions

In recent years, the Internet of Things (IoT) technology has led to the ...
research
01/02/2018

Validation of Hardware Security and Trust: A Survey

With ever advancing in digital system, security has been emerged as a ma...
research
10/27/2021

Teardown and feasibility study of IronKey – the most secure USB Flash drive

There are many solutions for protecting user data on USB Flash drives. H...
research
02/06/2021

uTango: an open-source TEE for the Internet of Things

Security is one of the main challenges of the Internet of Things (IoT). ...
research
07/04/2021

A Comprehensive Survey on the State-of-the-art Data Provenance Approaches for Security Enforcement

Data provenance collects comprehensive information about the events and ...
research
03/23/2023

IoT trust and reputation: a survey and taxonomy

IoT is one of the fastest-growing technologies and it is estimated that ...

Please sign up or login with your details

Forgot password? Click here to reset