Thread
Stories related to "RISC-V Foundation Forms Security Committee" across the full archive.
[arXiv](https://arxiv.org/abs/2211.10299)
Paper is in the repo, slides: http://users.ece.cmu.edu/~omutlu/pub/dram-row-hammer_kim_talk_isca14.pdf
As background, the lowRISC project aims to produce a fully open-source SoC using the RISC-V instruction set architecture and bring it to volume production. We've just released this document to describe in more detail our plans for tagged memory (not exactly the rebirth of the LISP machine, but has u...
> [..] In this talk, we present several methods that make *the large scale
security analyses of embedded devices* a feasible task. We implemented
those techniques in a scalable framework that we tested on real world data.
First, we collected a large number of firmware images from Internet
reposi...
After an intro to formal methods, it describes examples of hardware, software, and combined verifications of useful protection schemes. Recent work focuses more on HW/SW combined since it provides highest usability, security, and performance combination.
Computer Security, Privacy, and DNA Sequencing: Compromising Computers with Synthesized DNA, Privacy
(dnasec.cs.washington.edu)