Talk
Hardware Security Analysis on Soft-Core RISC-V Processors
Colin O'Flynn
41:05
Attacks against embedded systems cover a wide range of surfaces. Some of them, such as power analysis and fault injection, are low-level attacks that depend on the construction of the microcontroller running your firmware. The release of open-source RISC-V microcontroller cores allows you to investigate how changes in the microcontroller core impacts these attacks in a way that using off-the-shelf microcontrollers never allowed before. This talk will demonstrate how power analysis & fault injection works, and then demonstrate how you can setup different types of RISC-V cores on a FPGA platform to perform these sorts of attacks.
1 / 4
Please log in or create an account to test your knowledge and see the answers.
What is the main practical advantage Colin O'Flynn emphasizes for using soft-core RISC-V processors on FPGAs in hardware security experiments?
A
They let you reconfigure core features and compare different core implementations on the same FPGA board, enabling experiments you couldn't do with fixed hard-core MCUs.
B
They always run faster than commercial hard-core microcontrollers, so attacks complete more quickly.
C
They remove the need to understand the ISA because the FPGA hides instruction-level behavior.
D
They require proprietary licenses, which ensures more accurate vendor documentation for security testing.
E
They only work with the ChipWhisperer platform and cannot be used with other tools.









No comments or questions yet. Be the first to start the conversation!