Confidential computing for high-assurance RISC-V embedded systems

Viewed 39
The post discusses the application of confidential computing principles in RISC-V embedded systems, particularly focusing on high-assurance environments. It examines the underlying architecture requirements and the role of specific hardware extensions like CoVE. The user comments suggest a need for clarity regarding the distinctions between the ACE firmware and CoVE hardware extensions, as well as the operational capabilities of certain processors that don't support CoVE.
0 Answers