Proceedings of the 2021 Great Lakes Symposium on VLSI 2021
DOI: 10.1145/3453688.3461517
|View full text |Cite
|
Sign up to set email alerts
|

Hardware Secure Execution and Simulation Model Correlation using IFT on RISC-V

Abstract: This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 55 publications
(4 reference statements)
0
0
0
Order By: Relevance
“…The loads are encoded in I-type format, and the store instructions are encoded in S-type format. Two new instructions are added to the ISA, which is used to provide security checks for the 1-bit tag in the tag mechanism [44]. Based on the load and store encoding specified in the RISC-V core, the new instructions are as follows:…”
Section: Risc-vmentioning
confidence: 99%
“…The loads are encoded in I-type format, and the store instructions are encoded in S-type format. Two new instructions are added to the ISA, which is used to provide security checks for the 1-bit tag in the tag mechanism [44]. Based on the load and store encoding specified in the RISC-V core, the new instructions are as follows:…”
Section: Risc-vmentioning
confidence: 99%