Systems & Design
WHITEPAPERS

A Methodology To Verify Functionality, Security, And Trust for RISC-V Cores

A verification method for RISC-V core providers and system-on-chip (SoC) teams integrating these cores.

popularity

Modern processor designs present some of the toughest hardware verification challenges. These challenges are especially acute for RISC-V processor core designs, with a wide range of variations and implementations available from a plethora of sources. This paper describes a verification methodology available to both RISC-V core providers and system-on-chip (SoC) teams integrating these cores. It spans functional correctness, including compliance, detection of security vulnerabilities, and trust verification that no malicious logic has been inserted. Detailed examples of design bugs found in actual RISC-V core implementations are included.

Authors:
W. W. Chen, OneSpin Solutions, Munich, Germany
N. Tusinschi, OneSpin Solutions, Munich, Germany
T. L. Anderson, OneSpin Solutions, San Jose, CA, USA

Click here to read more.



Leave a Reply


(Note: This name will be displayed publicly)