Skip to main content
In the News

TechRadar Article: Security Is Now A Board Level Issue: How To Secure The Data Supply Chain

By June 12, 2019May 12th, 2021No Comments

Hardware security can be provided via a root of trust embedded into a chip that is part of the system as a secure IP core, or by adding a separate dedicated security chip. In most designs, security should be embedded in the main chip in the IoT device, such as an application processor or custom ASIC, to deliver optimal levels of security performance. Our own approach to embedding hardware security is delivered via a fully programmable hardware security core, built around a custom RISC-V CPU. The security processing core creates a siloed architecture that isolates and secures the execution of sensitive code, processes and algorithms from the primary processor. This mitigates the risk of critical vulnerabilities like the recent Meltdown and Spectre security flaws and allows designers to optimize the primary processor for high performance, low power or other characteristics, while optimizing security in the siloed core.
To read more, please visit:

Stay Connected With RISC-V

We send occasional news about RISC-V technical progress, news, and events.