반도체 AI 인더스트리 4.0 SDV 스마트 IoT 컴퓨터 통신 특수 가스 소재 및 장비 e4ds plus

Security Issues to Understand Before Adopting a RISC-V Solution

기사입력2020.02.04 16:35

RISC-V processors, an open ISA, are on the rise
IoT Security Threats Are More Deadly Than Traditional Applications
Multi-Zone Security, RISC-V Embedded Security Solution



RISC-V is an open instruction set architecture (ISA) based on reduced instruction set computer (RISC).

Unlike most ISAs, it is free to use for any purpose, and anyone is permitted to design, manufacture, and sell RISC-V chips and software. It is gaining much attention because it is free and developers can implement functions according to the design direction they want to achieve the desired performance.

For example, Microchip announced its RISC-V-based 'PolarFire SoC FPGA' last December, which features a RISC-V-based CPU cluster and a deterministic L2 memory subsystem that supports Linux and real-time applications.

As the use of RISC-V-based chipsets and solutions, rather than Arm and x86 architectures, increases, interest in security is also growing.

In particular, security threats to IoT devices and systems are more lethal than traditional security threats. Malfunctions in home appliances, vehicles, robots, and equipment can result in loss of life. Because IoT devices and systems are connected to each other through networks, they can affect other devices and systems or cause unexpected problems.

Jihoon Kim, a senior embedded solutions engineer at Microchip, introduced MultiZone security, which aims to make RICS-V the most secure platform, in a webinar titled “Implementing MultiZone Security in RISC-V Applications” on the 4th.

MultiZone Security, developed by HEX-Five Security, is an embedded security solution applicable to RISC-V-based chipsets. It provides policy-based hardware-enforced isolation for unlimited security domains with complete control over data, code, and peripherals.

Unlike existing solutions, it does not require additional hardware, dedicated cores, or complex programming models. Open source libraries, third-party binaries, and legacy code can be configured in minutes to achieve safety and security.
Embedded Computing Threat Model (Source: Microchip)

Mr. Kim explained the embedded computing threat model, RICS-V hardware security primitives, multi-zone trust execution environment, secure IoT stack using Microchip PolarFire SoC FPGA as an example, and the security role that multi-zone security actually plays inside the processor.

Multizone is currently available as an open source API. It is a free and open standard. The commercial implementation that Multizone is providing is the only one available on the market today and is designed for mixed criticality and purpose-built security systems.

As IoT services are expected to flood in earnest due to the activation of 5G, AI, etc., there is a movement to produce low-power IoT processors optimized for the company's applications at low prices. This has led to growing interest in RICS-V processors, as well as increasing security issues due to connectivity, a fundamental characteristic of IoT.

Developers will need to continuously acquire knowledge about RICS-V-based processors and related security solutions to ensure smooth operation of future IoT applications.

Meanwhile, Microchip will follow up this webinar, the first in its “Microchip Security Webinar Series,” with a follow-up on “Protecting Intellectual Property (IP) in the Cloud World” on March 3.
이수민 기자
기사 전체보기

클라우드 세계에서의 지적재산권(IP) 보호
2020-03-03 10:30~12:00
Microchip Technology Inc. / 엄명흠 차장