• Skip to main content
  • Skip to secondary menu
  • Skip to footer

Technologies.org

Technology Trends: Follow the Money

  • Technology Events 2026-2027
  • Sponsored Post
  • Technology Markets
  • About
    • GDPR
  • Contact

OneSpin Addresses the Challenges of RISC-V Verification Through Series of Speaking Engagements, Workshop, and Tutorials designed to help developers and integrators effectively verify RISC-V integrity: functional correctness, safety, security, and trust

September 16, 2019 By admin Leave a Comment

OneSpin® Solutions, provider of certified IC integrity verification solutions for building functionally correct, safe, secure, and trusted integrated circuits, today announced several technical speaking public engagements focused on the verification of RISC-V processor cores. The series of presentations, workshops, and tutorials will educate developers and integrators of RISC-V processor cores on how to properly address the challenges associated with verifying these cores and meeting ISA compliance.

OneSpin will present at the following events kicking off September 16 through October 29, 2019:

RISC-V EMEA Roadshow
Tel Aviv, Israel – September 16
Munich, Germany – September 18
London, UK – September 26

Verifying the Full Scope of RISC-V Integrity

This talk presents a verification flow covering the full scope of integrity for RISC-V cores and SoCs, spanning functional correctness, safety, security, and trust. It is essential for RISC-V core developers, engineers evaluating cores for possible use, and SoC teams integrating RISC-V cores from internal or external sources.

DVCon India
Bangalore, India – September 25

Effective Verification of RISC-V Cores and SoCs

This workshop provides guidance for RISC-V core vendors who need to verify their IP, developers of cores for internal consumption, engineers evaluating cores for possible use, and SoC teams integrating RISC-V cores from internal or external sources. Topics include formal verification of the ISA, detection of Trojans and malicious logic, and detection of hardware security holes.

RISC-V Week in Paris
Paris, France – October 2

Complete Formal Verification of RISC-V Cores for Trojan-Free Trusted ICs

RISC-V processor IPs are increasingly being integrated into system-on-chip designs for high-integrity, trusted applications. This presentation examines an efficient, novel, formal-based RISC-V verification methodology that detects both hardware Trojans and genuine functional errors present in the RTL code. The solution is demonstrated on an open-source RISC-V implementation using a commercially available formal tool.

DVCon Europe
Munich, Germany – October 29

RISC-V Integrity: A Guide for Developers and Integrators

The tutorial covers the complete scope of RISC-V core and SoC integrity: functional correctness (compliance to the ISA), safety, security, and trust. It includes examples of actual bugs found in open-source implementations of RISC-V cores and RISC-V-based SoCs.

For more information on how OneSpin can help with RISC-V verification, download the white paper “Assuring the Integrity of RISC-V Cores and SoCs.”

About OneSpin Solutions

OneSpin Solutions is a leading provider of certified IC integrity verification solutions for building functionally correct, safe, secure, and trusted integrated circuits. These solutions are based on OneSpin’s widely used formal verification technology and assure the integrity of SoCs, ASICs and FPGAs. Headquartered in Munich, Germany, OneSpin partners with leaders worldwide in automotive and industrial applications; defense; avionics; artificial intelligence and machine learning; consumer electronics; and communications. Its advanced solutions are well-suited for developing heterogeneous computing platforms, using programmable logic, and designing and integrating processor cores, such as RISC-V. OneSpin’s customer-oriented commitment is fundamental to its growth and success. OneSpin: Assuring IC Integrity. Visit www.OneSpin.com to learn more.

Filed Under: Tech Tagged With: RISC-V, RISC-V Verification

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Footer

Recent Posts

  • From Inventor to Follower: How the West Ceded WiFi’s Cutting Edge to China
  • Creao AI and the Closed-Loop Bet on Autonomous Work
  • Loop Raises $95 Million to Build the Intelligence Layer for Supply Chains
  • Booz Allen Backs Ulysses to Scale Autonomous Maritime Robotics
  • Quantum for Bio Challenge Winners Signal Real Momentum for Quantum Computing in Healthcare
  • Expo Raises $45 Million to Push Agentic Mobile App Development Into Production Reality
  • What are the reasons technology companies get acquired?
  • Resolve AI Raises $40 Million to Build the Missing Layer Between AI Models and Production Reality
  • Wayve’s $60 Million Extension Matters Because the Intelligence Stays on the Machine
  • Accenture Bets on Physical AI with General Robotics Investment

Media Partners

  • Market Analysis
  • Cybersecurity Market
Global WiFi Market: Size, Segmentation, Trends, and Forecast to 2030
Synera’s $40M Series B: What the Press Release Isn’t Saying
Amazon’s Globalstar Acquisition Is a Spectrum War Dressed as a Satellite Deal
The End of Manual Audits: Why AI-Native Accounting Is Not Optional Anymore
Raspberry Pi’s Earnings Beat Signals a Shift From Hobbyist Hardware to Embedded Infrastructure
Betting the Backbone: A Multi-Year Positioning on AMD, Broadcom, and Nvidia
Nvidia’s Groq 3 LPX: The $20B Bet That Could Define the Inference Era
Why Arm’s New AI Chip Changes the Rules of the Game
A Map Without Hormuz: Rewiring Global Oil Flows Through Fragmented Corridors
RoboForce’s $52 Million Raise Signals That Physical AI Is Moving From Demo Stage to Industrial Scale
International Cybersecurity Challenge 2026, May 18–21, Gold Coast, Australia
Bitdefender Expands GravityZone With Extended Email Security to Close the Inbox Gap
The Security Blind Spot Inside the Arduino-Powered IoT Boom
Altum Strategy Group: Cybersecurity in 2026 Is No Longer a Technology Problem
Trent AI and the Security Layer the Agentic Stack Has Been Missing
Gartner Security & Risk Management Summit, June 1–3, 2026, National Harbor, MD
Ashdod Port Has Blocked 134,000 Cyberattacks—and Kept Israel’s Trade Moving
Black Hat Asia 2026, April 23–24, Singapore
World Backup Day 2026: Why Recovery Has Become the Real Test of Cyber Resilience
Cyberhaven Launches Agentic AI Security as Shadow Agents Move Onto the Enterprise Endpoint

Media Partners

  • Market Research Media
  • Technology Conferences
How WiFi Changed Media
Canva Acquires Simtheory and Ortto to Build End-to-End Work Platform
Netflix Price Hikes, The Economics of Dominance in a Saturated Streaming Market
America’s Brands Keep Winning Even as America Itself Slips
Kioxia’s Storage Gambit: Flash Steps Into the AI Memory Hierarchy
Mamdani Strangling New York
The Rise of Faceless Creators: Picsart Launches Persona and Storyline for AI Character-Driven Content
Apple TV Arrives on The Roku Channel, Expanding the Streaming Platform Wars
Why Attraction-Grabbing Stations Win at Tech Events
Why Nvidia Let Go of Arm, and Why It Matters Now
COMPUTEX 2026, June 2–5, Taipei Nangang Exhibition Center & Taipei World Trade Center
ENGAGE 2026, April 27–28, New York
NAB Show 2026, April 18–22, Las Vegas
VivaTech 2026, June 17–20, Porte de Versailles, Paris
Accelerate 2026, May 21–22, 2026, Salt Palace Convention Center
JSNation 2026, June 11 & June 15, Amsterdam and Remote
ICMC 2026, July 30–31, Long Beach
Elevate 2026, April 22–24, 2026, Atlanta
WWDC 2026, June 8–12, Cupertino & Online
Zip Forward Europe 2026, April 16, 2026, London

Copyright © 2022 Technologies.org

Media Partners: Market Analysis & Market Research and Exclusive Domains, Photography