A Survey on RISC-V Security: Hardware and Architecture

by   Tao Lu, et al.

The Internet of Things (IoT) is an ongoing technological revolution. Embedded processors are the processing engines of smart IoT devices. For decades, these processors were mainly based on the Arm instruction set architecture (ISA). In recent years, the free and open RISC-V ISA standard has attracted the attention of industry and academia and is becoming the mainstream. Data security and user privacy protection are common challenges faced by all IoT devices. In order to deal with foreseeable security threats, the RISC-V community is studying security solutions aimed at achieving a root of trust (RoT) and ensuring that sensitive information on RISC-V devices is not tampered with or leaked. Many RISC-V security research projects are underway, but the academic community has not yet conducted a comprehensive survey of RISC-V security solutions. In order to fill this research gap, this paper presents an in-depth survey on RISC-V security technologies. This paper summarizes the representative security mechanisms of RISC-V hardware and architecture. Based on our survey, we predict the future research and development directions of RISC-V security. We hope that our research can inspire RISC-V researchers and developers.


page 3

page 5

page 8


Security, Privacy and Trust for Smart Mobile-Internet of Things (M-IoT): A Survey

With an enormous range of applications, Internet of Things (IoT) has mag...

Microservices in IoT Security: Current Solutions, Research Challenges, and Future Directions

In recent years, the Internet of Things (IoT) technology has led to the ...

Validation of Hardware Security and Trust: A Survey

With ever advancing in digital system, security has been emerged as a ma...

Teardown and feasibility study of IronKey – the most secure USB Flash drive

There are many solutions for protecting user data on USB Flash drives. H...

uTango: an open-source TEE for the Internet of Things

Security is one of the main challenges of the Internet of Things (IoT). ...

A Comprehensive Survey on the State-of-the-art Data Provenance Approaches for Security Enforcement

Data provenance collects comprehensive information about the events and ...

IoT trust and reputation: a survey and taxonomy

IoT is one of the fastest-growing technologies and it is estimated that ...

Please sign up or login with your details

Forgot password? Click here to reset