Examining the Top Five Fallacies About RISC-V
By David Patterson , Pardee Professor of Computer Science, Emeritus, at UC Berkeley, vice chair of the RISC-V International Board of Directors and Hex Five Advisor.
EETimes (December 13, 2022)
In a little over a decade, RISC-V has arguably become at least the third most important instruction set architecture (ISA) for future applications of computing. In the next few years, it may become just as surprising to pick a proprietary ISA over the open RISC-V for a new project as it would be to pick a closed alternative to Ethernet or USB.
My colleagues at UC Berkeley and I predict that by the end of this decade, the dominant ISA for future product development will be the open RISC-V architecture. Companies around the world are already designing with RISC-V and the momentum is rapidly increasing, so this is a good time for the industry to take a closer look at RISC-V and examine some fallacies about it.
Lessons from U.S. National Security and the Cyber Security Industry that Can Benefit You
April 29, 2021
Tiedemann Advisors Speaker Series
Cybersecurity: What You Need to Know and Do to Protect Yourself and Your Business
Securing In-Cabin AI using MultiZone TEE on a Secure FPGA SoC>
Juy 28, 2020
This post appeared on All About Circuits discusses trusted execution environments — already used in a variety of connected devices — by showing how using TEE and an FPGA SoC can work in vehicle in-cabin AI.
Part I to this article, Trusted Execution Environments (TEEs) in Connected Cars, discussed that while a Trusted Execution Environment (TEE) is widely used on mobile phones and other connected devices to secure critical functions, adoption in connected vehicles is low. The lack of TEE can create system vulnerabilities. In Part II we will take in-cabin AI as an example application, and discuss how a modern TEE and FPGA SoC can be its secure platform.
Strengthening the Internet of Things with RISC-V
June 3, 2020
Embedded applications require a layered security approach. Security through separation is essential, as it shields critical functionality from the attack surface introduced by untrusted large code base software. The days of proprietary, overly complicated, hardware-heavy TEEs are over as this legacy approach has proven inadequate to meet cost and agility requirements of modern IoT applications. Hex Five’s MultiZone Security offers a quick and safe way to add security and separation to RISC-V applications. MultiZone is based on RISC-V standards and can retrofit existing designs: you can take advantage of high security separation without the need for hardware and software redesign, eliminating the complexity associated with managing a hybrid hardware/software security scheme.
MultiZone Security Early Adopter Program
June 1, 2020
At Hex Five, we’re focused on finding ways to improve our products and provide a better customer experience. We want to help you build out a proof of concept that works for your business. The Hex Five Early Adopter Program (EAP) provides MultiZone® Security license at no cost and a number of engineering hours at an heavily discounted rate.
Contact us at http://hex-five.com/contact/ to see if your project is eligible for the EAP program *.
* Program available for a limited time.
Hex Five Video Interview @ RISC-V Summit 2019
December 12, 2019
August 4, 2019
July 25 was a gorgeous summer day. It’s also when the Keystone Enclave team hosted the 2019 Open-Source Enclave Workshop at University of California, Berkeley. Industry and academic luminaries representing 23 organizations gathered at Wozniak Lounge, Soda Hall to deliver 25 talks.
Keystone Enclave is an open-source project for building trusted execution environments (TEE) with secure hardware enclaves, based on the RISC-V architecture. Its goal is to build an open-source secure hardware enclave, accessible to everyone in industry and academia.
Turning IoT Stack Sideways
July 6, 2019
The Case for RISC-V
Nov 15, 2018
Here’s why we believe in RISC-V