Shakti-T: A RISC-V Processor with Light Weight Security Extensions
Citations
7 citations
Cites background from "Shakti-T: A RISC-V Processor with L..."
..., extensively modified core microarchitecture and ISA, efficiently provides a SEE for various security solutions, such as taint tracking and memory safety [30]–[32]....
[...]
6 citations
Cites background from "Shakti-T: A RISC-V Processor with L..."
...More targeted research projects have tested security extensions [20], [21], [22] while others have sought smallest implementation size [9], [23], or highest performance [17]....
[...]
6 citations
Cites background from "Shakti-T: A RISC-V Processor with L..."
...According to the value of slsel the result gets written to Register file at address giving by rd, because write enable for register file is also high....
[...]
...SW R8, 4(R0) store Mem[Reg[R0] + (4)] = Reg[8] The processor was tested at different modules by having dedicated Test-Benches for each module to verify the correctness of its architecture and result of the system thereby increasing the Robustness of the model....
[...]
...grup R8, R5, R1 group R5 according to R1 and store in R8 SW R8, 4(R0) store Mem[Reg[R0] + (4)] <= Reg[8]...
[...]
...The pcsel, bsel, slsel acts as the select lines for the next value of PC, for 2nd operand to ALU (B-select Block), for inputs to Register-file (Store Logic Block), respectively....
[...]
...The Register file module contains an array of 32 generalpurpose registers of width 32-bits each from R0 to R31....
[...]
6 citations
5 citations
References
1,536 citations
Additional excerpts
...Some of the proposed solutions include: stack canaries [8]; encryption of the code pointer [9]; storing the return address in a shadow stack [11, 33, 12]; re-arranging argument locations, return addresses, previous frame pointers and local variables [34]; control flow integrity checks [1]; and, Address Space Layout Randomization (ASLR) [31]....
[...]
1,367 citations
"Shakti-T: A RISC-V Processor with L..." refers background in this paper
...As the manifestations of buffer-overflow evolved over time, such as return-to-libc [30] and Return Oriented Programming (ROP) [29], several software defined solutions came into existence....
[...]
1,070 citations
"Shakti-T: A RISC-V Processor with L..." refers methods in this paper
...Researchers have also found several ways to exploit this vulnerability, such as the blaster worm [5] and the slammer worm [21] which have been used to perform Distributed Denial of Service attacks within a network....
[...]
992 citations
Additional excerpts
...Some of the proposed solutions include: stack canaries [8]; encryption of the code pointer [9]; storing the return address in a shadow stack [11, 33, 12]; re-arranging argument locations, return addresses, previous frame pointers and local variables [34]; control flow integrity checks [1]; and, Address Space Layout Randomization (ASLR) [31]....
[...]
951 citations
"Shakti-T: A RISC-V Processor with L..." refers background in this paper
...3092629 One of the most popular form of spatial memory attacks is buffer-overflow [28]....
[...]