Please use this identifier to cite or link to this item:
|Title:||Towards designing a secure RISC-V system-on-chip : ITUS||Authors:||Kumar, Vinay B. Y.
|Keywords:||Engineering::Computer science and engineering||Issue Date:||2020||Source:||Kumar, V. B. Y., Deb, S., Gupta, N., Bhasin, S., Haj-Yahya, J., Chattopadhyay, A. & Mendelson, A. (2020). Towards designing a secure RISC-V system-on-chip : ITUS. Journal of Hardware and Systems Security, 4, 329-342. https://dx.doi.org/10.1007/s41635-020-00108-8||Project:||NRF2018NCR-NCR002-0001
|Journal:||Journal of Hardware and Systems Security||Abstract:||A rising tide of exploits, in the recent years, following a steady discovery of the many vulnerabilities pervasive in modern computing systems has led to a growing number of studies in designing systems-on-chip (SoCs) with security as a first-class consideration. Fol- lowing the momentum behind RISC-V based systems in the public domain, much of this effort targets RISC- V based SoCs; most ideas, however, are independent of this choice. In this manuscript we present a consolida- tion of our early efforts along these lines in designing a secure SoC around RISC-V, named ITUS. In partic- ular, we discuss a set of primitive building blocks of a secure SoC and present some of the implemented se- curity subsystems using these building blocks—such as secure boot, memory protection, PUF-based key man- agement, a countermeasure methodology for RISC-V micro-architectural side-channel leakage, and an inte- gration of the open keystone-enclaves for TEE. The current ITUS SoC prototype, integrating the discussed security subsystems, was built on top of the lowRISC project, however, these are portable to any other SoC code base. The SoC prototype has been evaluated on an FPGA.||URI:||https://hdl.handle.net/10356/147284||ISSN:||2509-3436||DOI:||10.1007/s41635-020-00108-8||DOI (Related Dataset):||329–342(2020)||Rights:||© 2020 Springer International Publishing AG, part of Springer Nature. This is a post-peer-review, pre-copyedit version of an article published in Journal of Hardware and Systems Security. The final authenticated version is available online at: https://doi.org/10.1007/s41635-020-00108-8||Fulltext Permission:||open||Fulltext Availability:||With Fulltext|
|Appears in Collections:||SCSE Journal Articles|
Updated on Nov 27, 2022
Updated on Nov 27, 2022
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.