CVA6 RISC-V Virtualization: Architecture, Microarchitecture, and Design Space Exploration [PDF]
Virtualization is a key technology used in a wide range of applications, from cloud computing to embedded systems. Over the last few years, mainstream computer architectures were extended with hardware virtualization support, giving rise to a set of ...
Bruno Sá+5 more
semanticscholar +1 more source
Security, Reliability and Test Aspects of the RISC-V Ecosystem [PDF]
RISC-V has emerged as a viable solution on academia and industry. However, to use open source hardware for safety-critical applications, we need a deep understanding of the way in which well established mechanisms for testing and reliability could be integrated and deployed on the RISCV ecosystem, and we need a clear knowledge on how such an ecosystem ...
Abella Ferrer, Jaume+15 more
openaire +5 more sources
LIRA-V:Lightweight Remote Attestation for Constrained RISC-V Devices [PDF]
This paper presents LIRA-V, a lightweight system for performing remote attestation between constrained devices using the RISC-V architecture. We propose using read-only memory and the RISC-V Physical Memory Protection (PMP) primitive to build a trust ...
Jaloyan, Georges-Axel+2 more
core +2 more sources
Siracusa: A 16 nm Heterogenous RISC-V SoC for Extended Reality With At-MRAM Neural Engine [PDF]
Extended reality (XR) applications are machine learning (ML)-intensive, featuring deep neural networks (DNNs) with millions of weights, tightly latency-bound (10–20 ms end-to-end), and power-constrained (low tens of mW average power).
A. Prasad+11 more
semanticscholar +1 more source
Hybrid Modular Redundancy: Exploring Modular Redundancy Approaches in RISC-V Multi-core Computing Clusters for Reliable Processing in Space [PDF]
Space Cyber-Physical Systems such as spacecraft and satellites strongly rely on the reliability of onboard computers to guarantee the success of their missions.
M. Rogenmoser+4 more
semanticscholar +1 more source
An ultra-low-power processor pipeline-structure
With the rapid development of communication and chip technology, IoT will be an important part of the next generation of information technology, a powerful driving force to promote the intelligent process of our lives. Among the IoT terminal applications,
Deng Tianchuan, Hu Zhenbo
doaj +1 more source
DEMIX: Domain-Enforced Memory Isolation for Embedded System
Memory isolation is an essential technology for safeguarding the resources of lightweight embedded systems. This technique isolates system resources by constraining the scope of the processor’s accessible memory into distinct units known as domains ...
Haeyoung Kim+4 more
doaj +1 more source
Software Development Vehicles to enable extended and early co-design: a RISC-V and HPC case of study [PDF]
Prototyping HPC systems with low-to-mid technology readiness level (TRL) systems is critical for providing feedback to hardware designers, the system software team (e.g., compiler developers), and early adopters from the scientific community. The typical
F. Mantovani+8 more
semanticscholar +1 more source
ChaCha20–Poly1305 Authenticated Encryption with Additional Data for Transport Layer Security 1.3
Transport Layer Security (TLS) provides a secure channel for end-to-end communications in computer networks. The ChaCha20–Poly1305 cipher suite is introduced in TLS 1.3, mitigating the sidechannel attacks in the cipher suites based on the Advanced ...
Ronaldo Serrano+4 more
doaj +1 more source
BRISC-V emulator: a standalone, installation-free, browser-based teaching tool [PDF]
Many computer organization and computer architecture classes have recently started adopting the RISC-V architecture as an alternative to proprietary RISC ISAs and architectures.
Isakov, Mihailo, Kinsy, Michel A.
core