Security concerns are looming over the adoption of the RISC-V chip architecture, despite its growing popularity in various industries such as automotive technology, critical infrastructure, and industrial sectors. The open and free-to-license nature of RISC-V has attracted interest from companies like NASA, which is incorporating the architecture into its space programs. Omdia estimates that RISC-V shipments could reach 17 billion processors by 2030, with a 50% annual growth rate starting in 2024.
However, vulnerabilities in RISC-V designs have raised alarm bells about the security risks associated with the architecture. At the recent Black Hat USA conference, researchers unveiled a vulnerability called Ghostwrite, which allows users to bypass memory protection and access privileged memory in a specific RISC-V chip design known as Xuantie C910. This chip, developed by T-Head (a subsidiary of Alibaba Group), was one of the first RISC-V processors with a vector extension, making it popular among users looking to run demanding applications like AI.
Although the vulnerability can be mitigated by disabling the vector extension, the challenge lies in implementing this fix effectively. Fabian Thomas, a researcher at CISPA Helmholtz Center for Information Security, highlighted the difficulty in addressing hardware vulnerabilities, especially in the field where updates are not easily applied. This raises concerns about the potential for malicious actors to exploit these vulnerabilities in critical systems.
The issue of shared designs further complicates the situation, as the open-source nature of RISC-V means that faulty designs could be replicated and used across various applications. This poses a significant challenge for security teams trying to identify and mitigate vulnerabilities that may exist in shared RISC-V designs. Margaret Schmitt, a hardware security consultant, emphasized the risks associated with using open-source chip designs, comparing it to the potential for introducing backdoors or malware in software projects.
The heightened interest in RISC-V by countries like China and Russia has also added a geopolitical dimension to the security concerns surrounding the architecture. Both countries have increased their investment in RISC-V technology, particularly after facing restrictions on advanced chip exports from the U.S. This has raised questions about the potential for intentional weaknesses to be introduced into RISC-V designs, especially in light of limited control over the architecture’s usage.
In response to these security challenges, organizations working with RISC-V chips are urged to prioritize security and seek out established companies with expertise in designing secure RISC-V solutions. Companies like SiFive and Ventana Micro Systems are cited as examples of firms with strong security processes and a track record of designing secure chips. By partnering with these trusted entities, organizations can enhance the security of their RISC-V implementations and mitigate the risks associated with potential vulnerabilities.
Overall, while the potential benefits of RISC-V architecture are significant, the security concerns must be addressed effectively to ensure its widespread adoption and integration into critical systems. By working closely with security partners and prioritizing security measures, organizations can leverage the advantages of RISC-V while safeguarding against potential vulnerabilities and risks.

