Please use this identifier to cite or link to this item:
https://hdl.handle.net/10356/147284
Title: | Towards designing a secure RISC-V system-on-chip : ITUS | Authors: | Kumar, Vinay B. Y. Deb, Suman Gupta, Naina Bhasin, Shivam Haj-Yahya, Jawad Chattopadhyay, Anupam Mendelson, Avi |
Keywords: | Engineering::Computer science and engineering | Issue Date: | 2020 | Source: | Kumar, V. B. Y., Deb, S., Gupta, N., Bhasin, S., Haj-Yahya, J., Chattopadhyay, A. & Mendelson, A. (2020). Towards designing a secure RISC-V system-on-chip : ITUS. Journal of Hardware and Systems Security, 4, 329-342. https://dx.doi.org/10.1007/s41635-020-00108-8 | Project: | NRF2018NCR-NCR002-0001 BICSAF |
Journal: | Journal of Hardware and Systems Security | Abstract: | A rising tide of exploits, in the recent years, following a steady discovery of the many vulnerabilities pervasive in modern computing systems has led to a growing number of studies in designing systems-on-chip (SoCs) with security as a first-class consideration. Fol- lowing the momentum behind RISC-V based systems in the public domain, much of this effort targets RISC- V based SoCs; most ideas, however, are independent of this choice. In this manuscript we present a consolida- tion of our early efforts along these lines in designing a secure SoC around RISC-V, named ITUS. In partic- ular, we discuss a set of primitive building blocks of a secure SoC and present some of the implemented se- curity subsystems using these building blocks—such as secure boot, memory protection, PUF-based key man- agement, a countermeasure methodology for RISC-V micro-architectural side-channel leakage, and an inte- gration of the open keystone-enclaves for TEE. The current ITUS SoC prototype, integrating the discussed security subsystems, was built on top of the lowRISC project, however, these are portable to any other SoC code base. The SoC prototype has been evaluated on an FPGA. | URI: | https://hdl.handle.net/10356/147284 | ISSN: | 2509-3436 | DOI: | 10.1007/s41635-020-00108-8 | DOI (Related Dataset): | 329–342(2020) | Schools: | School of Computer Science and Engineering School of Physical and Mathematical Sciences |
Rights: | © 2020 Springer International Publishing AG, part of Springer Nature. This is a post-peer-review, pre-copyedit version of an article published in Journal of Hardware and Systems Security. The final authenticated version is available online at: https://doi.org/10.1007/s41635-020-00108-8 | Fulltext Permission: | open | Fulltext Availability: | With Fulltext |
Appears in Collections: | SCSE Journal Articles |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
HaSS_manuscript.pdf | 567.48 kB | Adobe PDF | ![]() View/Open |
Page view(s)
463
Updated on May 5, 2025
Download(s) 5
860
Updated on May 5, 2025
Google ScholarTM
Check
Altmetric
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.