Proceedings of the Hardware and Architectural Support for Security and Privacy 2017
DOI: 10.1145/3092627.3092629
|View full text |Cite
|
Sign up to set email alerts
|

Shakti-T

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
9
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 38 publications
(9 citation statements)
references
References 30 publications
0
9
0
Order By: Relevance
“…In addition to the research mentioned in [12], there are several new research on security ISA extension. Menon et al [51] developed a RISC-V 64 bit processor Shakti-T, which supports a customized ISA extension containing 8 new instructions for temporal and spatial memory attack protection. Das et al [62] developed another RISC-V processor Shakti-MS.…”
Section: H Securitymentioning
confidence: 99%
“…In addition to the research mentioned in [12], there are several new research on security ISA extension. Menon et al [51] developed a RISC-V 64 bit processor Shakti-T, which supports a customized ISA extension containing 8 new instructions for temporal and spatial memory attack protection. Das et al [62] developed another RISC-V processor Shakti-MS.…”
Section: H Securitymentioning
confidence: 99%
“…The work in [13] is an example of how the openness of RISC-V enables academia to work on systematic approaches to eliminating attack surfaces instead of fixing specific security holes and provide strong security guarantees against cache timing and memory access pattern attacks. Another example is [14], which proposes an extension of RISC-V against temporal and spatial memory attacks.…”
Section: Securitymentioning
confidence: 99%
“…Pure software solutions like [28] and [29] can be combined to tackle most kinds of spatial and temporal attacks, but this approach leads to high code size and runtime overheads of around 116% [29]. On the other hand, hardware solutions like [23,25] reduce the run time overhead at the cost of hardware complexity. Although [23] enhances a RISC-V processor to efficiently implement memory checks, the software support required for [23] is extremely complex.…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, hardware solutions like [23,25] reduce the run time overhead at the cost of hardware complexity. Although [23] enhances a RISC-V processor to efficiently implement memory checks, the software support required for [23] is extremely complex. Watchdog [25], is a compiler plus hardware solution for memory safety.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation