Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
97 tokens/sec
GPT-4o
53 tokens/sec
Gemini 2.5 Pro Pro
43 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Trusted Hart for Mobile RISC-V Security (2211.10299v2)

Published 18 Nov 2022 in cs.CR and cs.AR

Abstract: The majority of mobile devices today are based on Arm architecture that supports the hosting of trusted applications in Trusted Execution Environment (TEE). RISC-V is a relatively new open-source instruction set architecture that was engineered to fit many uses. In one potential RISC-V usage scenario, mobile devices could be based on RISC-V hardware. We consider the implications of porting the mobile security stack on top of a RISC-V system on a chip, identify the gaps in the open-source Keystone framework for building custom TEEs, and propose a security architecture that, among other things, supports the GlobalPlatform TEE API specification for trusted applications. In addition to Keystone enclaves the architecture includes a Trusted Hart -- a normal core that runs a trusted operating system and is dedicated for security functions, like control of the device's keystore and the management of secure peripherals. The proposed security architecture for RISC-V platform is verified experimentally using the HiFive Unleashed RISC-V development board.

User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (7)
  1. Vladimir Ushakov (1 paper)
  2. Sampo Sovio (2 papers)
  3. Qingchao Qi (1 paper)
  4. Vijayanand Nayani (1 paper)
  5. Valentin Manea (1 paper)
  6. Philip Ginzboorg (4 papers)
  7. Jan Erik Ekberg (1 paper)
Citations (2)

Summary

We haven't generated a summary for this paper yet.