Page 22 - 23_EETE_03
P. 22

22 EE|Times EUROPE



         EMBEDDED WORLD 2023: SECURITY FOCUS
        Codasip Takes Up the Cause of RISC-V Processor


        Security


        By Saumitra Jagdale

              ISC-V has gathered considerable momentum in
              recent years, aided by companies like Google,
              which has announced its Android mobile operating
       Rsystem’s support for the open-source instruction
        set architecture. Companies are using the architecture for a
        variety of processing applications, and Codasip, a founding
        member of RISC-V International, aims to provide customers
        with tools to develop processor cores tailored to their needs.
          Codasip customers have shipped more than 2 billion
        cores based on RISC-V, Rupert Baines, CMO of the com-
        pany, told EE Times Europe during a recent interview in
        which he discussed the security trends in processors and
        ISAs.
           “The customer has complete ownership of the architec-
        ture license and can customize the cores however needed,”
        Baines said. With a customized chip development platform
        and programming language with a high level of abstraction,
        the developer does not have to worry about the implemen-
        tation. This abstraction allows the user to add security
        features to cores in a way that is as simple as importing a
        library or changing compiler settings, according to Baines.   CERBERUS ACQUISITION
          The advantage is that the abstraction mitigates vulnerabilities like   Baines said the recent acquisition of Cerberus by Codasip figures into
        Spectre and Meltdown, which are introduced as a result of errors as   its platform’s security implementation. Cerberus has deep experience
        security implementations are typed in line by line. The high level of   in chip security, ranging from consumer electronics to large-scale
        abstraction allows added security features to be tested and verified by   projects and extending beyond consulting to development of secu-
        Codasip while being completely transparent to an audit if the client so   rity solutions. Previously, Codasip would recommend Cerberus to its
        chooses, said Baines.                                 customers. The acquisition brings Cerberus intellectual property and
                                                              technology assets under the Codasip umbrella to become an integral
        DUAL-CORE LOCK-STEP APPROACH                          part of the Codasip Labs platform for building and testing processor
        A fundamental concept in the design of fault-proof systems is the dual-  specifications, extending the platform’s features of ease of use and
        core lock-step approach, in which two cores run the same operation   complete customizability, according to Baines.
        (in parallel, often with a few cycles’ worth of delay) and the output of   The acquisition comes amid growing attention worldwide on
        these independent operations is compared. Any deviation between the   security, with countries like the U.K. having already developed safety
        outputs will signal that there is a security issue.   standards for IoT applications. The heightened emphasis on security
          Every core type has this implementation, but the details vary. For   highlights the need for companies to invest in strong measures to pro-
        example, ARM implements the feature as a black box. There’s no way   tect their customers and prevent potential breaches. Security features
        to run a detailed audit of the implementation; the user has to trust the   are no longer considered optional extras but increasingly critical capa-
        manufacturer that the security system works.          bilities. The threats, and thus the security implementation, will vary
          In most cases, however, it is preferable to be able to audit and test   with the application. In automotive, for example, security vulnerabili-
        dual-core lock-step implementations, using the open-source capabili-  ties are a potentially fatal flaw.
        ties supported by the RISC-V standard.
          Codasip’s implementation of the dual-core lock-step method   SecuRISC5 INITIATIVE TO ORGANIZE THE INDUSTRY
        involves introducing a jitter between the two parallel procedures while   These recent changes are part of Codasip’s security initiative,
        comparing them in a context that understands this jitter, an approach   SecuRISC5. The initiative extends to fostering partnerships among
        that the company says prevents myriad vulnerabilities and attacks from   companies to accelerate the adoption of security recommendations.
        breaching the system. In addition to implementing this concept,    Apart from offering security solutions, Codasip will be implementing
        Codasip allows for customers to test, audit and examine the implemen-  standards described by RISC-V International under the initiative. The
        tation in detail, with relative ease.                 company also intends to develop reference security implementations
                                                              for specific use cases that others can use to develop their own solu-
                                                              tions. The references will follow the latest standards outlined by the
                                                              RISC-V Foundation, said Baines.
                                                                 “RISC-V is changing the world of processors,” he said. “The opportu-
                                                              nities the technology presents are phenomenal.”      IMAGE: SHUTTERSTOCK
                                                                Codasip is growing in response to this change by hiring experts and
                                                              investing in acquisitions like Cerberus that will help the company add
        Dual-issue core (Source: Codasip)                     functionality and feature sets to its products. ■

        MARCH 2023 | www.eetimes.eu
   17   18   19   20   21   22   23   24   25   26   27