[Submitted on 11 Dec 2022]
Abstract: With the widespread popularity of RISC-V — an open-source ISA — custom
hardware security solutions targeting specific defense needs are gaining
popularity. These solutions often require specialized compilers that can insert
metadata (called tags) into the generated binaries, and/or extend the RISC-V
ISA with new instructions. Developing such