Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/147284
Title: Towards designing a secure RISC-V system-on-chip : ITUS
Authors: Kumar, Vinay B. Y.
Deb, Suman
Gupta, Naina
Bhasin, Shivam
Haj-Yahya, Jawad
Chattopadhyay, Anupam
Mendelson, Avi
Keywords: Engineering::Computer science and engineering
Issue Date: 2020
Source: Kumar, V. B. Y., Deb, S., Gupta, N., Bhasin, S., Haj-Yahya, J., Chattopadhyay, A. & Mendelson, A. (2020). Towards designing a secure RISC-V system-on-chip : ITUS. Journal of Hardware and Systems Security, 4, 329-342. https://dx.doi.org/10.1007/s41635-020-00108-8
Project: NRF2018NCR-NCR002-0001
BICSAF
Journal: Journal of Hardware and Systems Security
Abstract: A rising tide of exploits, in the recent years, following a steady discovery of the many vulnerabilities pervasive in modern computing systems has led to a growing number of studies in designing systems-on-chip (SoCs) with security as a first-class consideration. Fol- lowing the momentum behind RISC-V based systems in the public domain, much of this effort targets RISC- V based SoCs; most ideas, however, are independent of this choice. In this manuscript we present a consolida- tion of our early efforts along these lines in designing a secure SoC around RISC-V, named ITUS. In partic- ular, we discuss a set of primitive building blocks of a secure SoC and present some of the implemented se- curity subsystems using these building blocks—such as secure boot, memory protection, PUF-based key man- agement, a countermeasure methodology for RISC-V micro-architectural side-channel leakage, and an inte- gration of the open keystone-enclaves for TEE. The current ITUS SoC prototype, integrating the discussed security subsystems, was built on top of the lowRISC project, however, these are portable to any other SoC code base. The SoC prototype has been evaluated on an FPGA.
URI: https://hdl.handle.net/10356/147284
ISSN: 2509-3436
DOI: 10.1007/s41635-020-00108-8
DOI (Related Dataset): 329–342(2020)
Rights: © 2020 Springer International Publishing AG, part of Springer Nature. This is a post-peer-review, pre-copyedit version of an article published in Journal of Hardware and Systems Security. The final authenticated version is available online at: https://doi.org/10.1007/s41635-020-00108-8
Fulltext Permission: open
Fulltext Availability: With Fulltext
Appears in Collections:SCSE Journal Articles

Files in This Item:
File Description SizeFormat 
HaSS_manuscript.pdf567.48 kBAdobe PDFView/Open

Page view(s)

229
Updated on Nov 27, 2022

Download(s) 50

93
Updated on Nov 27, 2022

Google ScholarTM

Check

Altmetric


Plumx

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.