Securing RISC-V Third-Party IP: Enabling Comprehensive CWE-Based Assurance Across the Design Supply Chain

Securing RISC-V Third-Party IP: Enabling Comprehensive CWE-Based Assurance Across the Design Supply Chain

SemiWiki
SemiWikiMar 2, 2026

Key Takeaways

  • CWE-based methodology replaces ad-hoc IP reviews
  • Templates cut RISC‑V assurance NRE dramatically
  • SiFive X280 case found 3 failing CWEs, 12 passing
  • Reusable tests enable cross‑core security verification
  • Structured assurance clarifies mitigation responsibilities

Summary

RISC‑V adoption drives the need for third‑party IP security. Arteris (formerly Cycuity) introduced a CWE‑based assurance framework that translates MITRE weaknesses into reusable security requirements, verification properties, and portable C‑tests. A pilot with SiFive’s X280 core analyzed 16 of 60 scoped CWEs, confirming 12, flagging 3 and excluding 1, showing how templated artifacts cut non‑recurring engineering effort. The approach promises scalable, repeatable validation across the RISC‑V ecosystem and beyond.

Pulse Analysis

The rapid rise of RISC‑V cores in commercial and government silicon has turned third‑party IP into a double‑edged sword. While open‑source designs accelerate time‑to‑market, they also expand the attack surface, because a single vulnerability in a processor block can propagate through an entire system‑on‑chip. Traditional integration practices—vendor claims, checklist reviews, and limited testing—provide little assurance that all relevant weakness classes have been addressed. Consequently, design teams are seeking a disciplined, engineering‑first approach that embeds security validation directly into the RTL verification flow.

The CWE‑based framework introduced by Arteris translates MITRE’s Common Weakness Enumeration into concrete security requirements, executable properties, and portable C‑test suites. By creating reusable templates for each weakness, verification engineers can parameterize checks for any RISC‑V core with minimal code changes. In a pilot with SiFive’s X280 core, 60 potential CWEs were scoped and 16 were examined; twelve passed, three failed and one was out of scope, illustrating how the method surfaces design‑level gaps without exposing proprietary RTL. The structured artifacts also generate traceable assurance evidence, enabling program managers to quantify residual risk and plan mitigations early.

Beyond RISC‑V, the same methodology can be applied to accelerators, peripherals, and any third‑party block, turning security assurance from a reactive checklist into a repeatable engineering discipline. The reuse of requirement templates and test harnesses slashes non‑recurring engineering effort, delivering cost savings that are especially critical for defense and trusted‑microelectronics programs with tight schedules. As the ecosystem matures, a common, CWE‑aligned language will foster tighter collaboration between IP vendors and integrators, improving transparency while protecting intellectual property. Ultimately, scalable, measurable assurance will become a prerequisite for any high‑assurance silicon roadmap.

Securing RISC-V Third-Party IP: Enabling Comprehensive CWE-Based Assurance Across the Design Supply Chain

Comments

Want to join the conversation?