Cyber-security with RISC-V Computer System
Core Knowledge
Learn how to modify a RISC-V computer system for security purposes.
Examples: cryptographic accelerators, secure boot, side-channel attacks, etc.
Course Requirement
Participants must have studied courses 01: RISC-V Computer System Integration, 02: Hardware Design with CHISEL, and 03: Linux on RISC-V.
Exercises in this course use the Arty-A7 FPGA board. Participants need to have an Arty-A7 to learn this course.
Note: both 35T and 100T versions of the FPGA are ok.