Security News
Black Hat Computer security researchers at the CISPA Helmholtz Center for Information Security in Germany have found serious security flaws in some of Alibaba subsidiary T-Head Semiconductor's RISC-V processors. Thus the security issues here with the C910 lie with T-Head's own implementation of the ISA, specifically its non-standard implementation of the vector extension, and not the specs themselves nor other RISC-V chips.
Unlike other CPU fuzzers, Cascade can construct long random programs that manage the control flow during execution. What separates Cascade from similar tools is that it relies on a technique called asymmetric ISA pre-simulation.
The RISC-V Foundation, a non-profit corporation controlled by its members to drive the adoption and implementation of the free and open RISC-V instruction set architecture (ISA), announced the...
wolfSSL, a leading provider of TLS cryptography and Hex Five Security, provider of MultiZone Security, the first Trusted Execution Environment for RISC-V announce general availability of the...
Those developing custom CPUs can now tap a TrustZone-ish trusted execution environment If you've been looking at SiFive's RISC-V-based chip technology and thinking, y'know what, it's missing an...
Open source trusted execution component expected this fall At some point this fall, a team of researchers from MIT's CSAIL and UC Berkeley's EECS aim to deliver an initial version of an open...
Unveil first code, joins giants in industry standard-club Last week, the first RISC-V port of its seL4 microkernel was released by the Data61 division of the Australian government's Commonwealth...
Unveil first code, joins giants in industry standard-club Last week, the Data61 division of Australia's Commonwealth Scientific and Industrial Research Organisation (CSIRO) released the first...