Telecoms, Media & Technology is part of the Knowledge and Networking Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 3099067.

Key Sessions

Rick O' Connor

Welcome and RISC-V ISA & Foundation Overview

RISC-V Foundation

Charlie Su

Keynote: RISC-V: From Hype to Ripe

Andes Technology Corporation

Jeremy Liu

MediaTek RISC-V Processor on Sensorhub Application


Tony Xu

Our Passion on the Popularization of RISC-V

Nuclei System Technology

Mar 12
Show Filter
08:00 - 08:55 55 mins
Registration | 8:00 AM - 5:00 PM
08:55 - 09:00 5 mins
  • Chih-Tsun Huang - Associate Professor, National Tsing Hua University
09:00 - 09:15 15 mins
Welcome and RISC-V ISA & Foundation Overview
  • Rick O' Connor - Executive Director, RISC-V Foundation
09:15 - 09:55 40 mins
Panel: Opportunities & Challenges in AIoT
  • Moderator Chen-Yi Lee - Professor, National Chiao-Tung University
  • Panelist Frankwell Lin - President, Andes Technology
  • Panelist Steve Lo - Chairman, Egis Technology Corp.
  • Panelist Ted Marena - Chairman, RISC-V Marketing Committee | Director, RISC-V Ecosystem, Western Digital, RISC-V Foundation
  • Panelist Ted Speers - Board member | Head of Product Architecture and Planning, Technical Fellow, RISC-V Foundation | Microchip Technology

RISC-V is an emerging instruction set architecture. Because of its openness, compactness, modularity, and extensibility, RISC-V is quickly adopted in applications such as AIoT and many more. With its ecosystem with explosive growth potential, the future development is limitless. The panel will be focused on the opportunities and challenges RISC-V faces today.

10:00 - 10:25 25 mins
Keynote: RISC-V: From Hype to Ripe
  • Charlie Su - CTO and SVP, Andes Technology Corporation

(Ripe, used as a noun hereJ, means readiness for harvest or action.)

Coming out of Berkeley, RISC-V quickly gathered many enthusiasts, from academia and research institutes, open source community, commercial companies to individuals. Then, here came the RISC-V Foundation and the ecosystem grows at an amazing speed. Companies designing their own RISC-V processors for their SoC’s and companies designing RISC-V CPU IPs to license like Andes started bootstrapping the process by connecting the dots from the hardware end. As a fast-moving subject, it is not unusual running into people who think RISC-V is what it is not.

In this talk, we will talk about the fact, hype and expectation about RISC-V, how to avoid confusion and disappointment, and how to leverage the best of RISC-V today and make your products ripe for prime time.

10:25 - 10:50 25 mins
Networking Break
10:50 - 11:05 15 mins
RISC-V Technical Committee Update
  • Kevin Chen - Co-Chair, RISC-V Fast Interrupt Task Group | Senior Architect, Architecture Division, Andes, Andes Technology
11:05 - 11:20 15 mins
RISC-V Marketing Committee Update
  • Ted Marena - Chairman, RISC-V Marketing Committee | Director, RISC-V Ecosystem, Western Digital, RISC-V Foundation
11:20 - 11:35 15 mins
Status update of RISC-V P extension task group
  • Chuan-Hua Chang - Chair, RISC-V P-extension Task Group | Senior Director, Architecture Division, Andes Technology, Andes Technology Corporation

The RISC-V P (DSP) extension task group is formed in August 2018. The chair of the task group is Chuan-Hua Chang from Andes Technology. The co-chair of the task group is Eric Flamand from GreenWaves Technologies. The charter of the P extension task group is as follows:  Define and ratify Packed-SIMD DSP extension instructions operating on XLEN-bit integer registers for embedded RISC-V processors. The TG will also define compiler intrinsic functions that can be directly used in high-level programming languages.  The scope of XLEN is expected to be 32, 64, and 128.  The task group will use AndeStar V3 DSP ISA extension and Pulp DSP ISA extension as references for defining the P ISA extension. Both ISA extensions have been supported by gcc compiler and have been implemented in several silicon chips.  The proposed instructions have been documented in a spreadsheet under the review of the task group participants.  This talk will be focused on reporting the progress and the current status of the P extension task group on designing the extension and the issues discussed and determined by the task group participants. And more performance data on general DSP functions and audio/speech applications will be given to help determine the usefulness of the proposed instructions.

11:35 - 12:00 25 mins
Simulation Evaluation of Chaining Implementation for the RISC-V Vector Extension
  • Zhen Wei - Graduate Student, Department of Computer Science and Information Engineering, National Taiwan University

RISC-V is designed to scale from low-power microcontroller to high-performance supercomputers. The key to such a scalable performance is its vector extension ISA. Different from conventional wide-word parallelism based SIMD ISA, such as x86 SSE/AVX, and ARM/NEON, which is common in microprocessors, RISC-V exploits vector register based designs. Vector register based computing is more scalable since the same vector instructions would take fewer cycles on an implementation with more vector pipelines. Since a vector register could be long, so a vector instruction may take multiple or even many cycles. In order to avoid the delay waiting for the completion of a producing vector instruction, vector chaining is often implemented to allow the depending vector instruction to start execution as soon as its first element is ready. Full chaining in Cray-1/Cray-XMP/YMP includes memory chaining as well as functional unit chaining. However, Cray vector supercomputers did not adopt virtual memory systems and data caches. For modern microprocessors that are heavily built around cache hierarchies, the implementation of memory chaining may be challenging. We use an in-house developed RISC-V simulator to evaluate the performance tradeoffs between the full chaining and various restricted chaining implementations.

12:00 - 12:15 15 mins
RISC-V Segmentation Extension Proposal
  • Wuyang Chung - Freelancer, Self-Employed

Traditional operating systems use virtual memory to create protection domains for processes. Each process has its own private virtual address space (protection domain) so they can be protected from each other. The drawbacks of this multiple address space model are that context switch overhead is high and data sharing is complex and difficult. In order to avoid these drawbacks, single address space operating system (SASOS) has been proposed. The biggest problem with SASOS is protection. There are several ways to create multiple protection domains on a single address space and capability system is one of the them. There are also several ways to implement capability system and segmentation is one of them. Besides being used as a mechanism to build a SASOS, there are several other benefits of segmentation. It can be used to point to I/O address space so a user level device driver can access its hardware device directly without kernel intervention. It can translate a segment address directly to physical address so TLB pollution from segment with very low or no locality of reference can be avoided. It can be helpful to implement software-managed TLB. It can also be used as a way to do upcall from kernel to user space.

12:15 - 13:15 60 mins
Lunch & Networking Break: Tabletops open
13:15 - 13:40 25 mins
MediaTek RISC-V Processor on Sensorhub Application
  • Jeremy Liu - Senior Engineer, MediaTek
  • Shih-Han Lin - Department Manager, MediaTek

Mediatek's first RISC-V based processor would be in 2019 smartphone SoC for sensor hub lower power application. This RISC-V based processor improve 2X performance and 50% power efficiency on voice wakeup (VoW) at the same time. The RISC-V based LLVM & LLDB toolchain is open to external to enable the possibility for MediaTek customer to do product differentiation and 3rd party vendors to optimize their algorithm on MediaTek SoC. The RISC-V based processor would be mass production in MediaTek 2019 SoC product and foreseeable to have more than 1 billion instances shipment in 3 years.

13:45 - 14:10 25 mins
New Members of AndeStar V5 Processor IPs
  • Charlie Su - CTO and SVP, Andes Technology Corporation

AndeStar V5 is an extension architecture based on and fully compliant to RISC-V. AndeStar V5 processors already have 6 members, covering 32-bit and 64-bit cores with fast-and-compact integer control, high-performance floating-point, and Linux support. In this talk, we will give an update of AndeStar V5 processor solutions with new features and more benchmarking data. In addition, we will introduce a couple new V5 processor IPs to further broaden AndeStar support to the RISC-V community.

14:15 - 14:40 25 mins
Our Passion on the Popularization of RISC-V
  • Tony Xu - COO, Nuclei System Technology

Nuclei System Technology Co. Ltd. is a leading RISC-V core IP company in China. We focus on popularization and commercialization of RISC-V and work with our partner and the local community to grow the ecosystem in China. Bob Hu, the founder of the company, is a famous RISC-V technology evangelist. He is the creator open source RISC-V core Hummingbird E203, and the author of the first and the second RISC-V books in Chinese. Together with him, we continuously share our passion and thought of RISC-V to the others. Happily, more and more people not just only know what is RISC-V and start to adopt the cores based on it in their product. Currently, we have released N200 series ultra-low power RISC-V core IP for IoT application and is actively extending the product line. Our vision is to work closely with partners to help our customers to reach success by accelerating the innovation. In this talk, we will discuss the status of RISC-V in China, introduce our contribution to the popularization of RISC-V in China, and share our thoughts for the next step.

14:40 - 15:05 25 mins
Networking Break & Tabletop Visit
15:05 - 15:30 25 mins
Platform Security--A Detailed Comparison of RISC-V to ARM's TrustZone
  • Don Barnetson - Co-Founder & Outbound Lead, Hex-Five

ARM's TrustZone has become a reference for security in microcontrollers, but exactly what TrustZone is and what use cases it enables are often misunderstood by end users.  RISC-V offers a simpler, more core-centric approach to MCU security that enables a simpler implementation for designers. This talk compares the hardware features of both TrustZone A, M and PSA to the RISC-V Privileged Architecture Specification v1.1.  It then delves into the software stacks available in TrustZone and RISC-V to discuss the design point, use cases, complexity and attack vectors mitigated in each architecture. The listener will be left with a detailed understanding of how RISC-V security compares to TrustZone security in order to inform a platform migration decision.

15:35 - 16:00 25 mins
CryptospeC: a Trust Module System for 64-bit RISC-V Core Complex
  • Shumpei Kawasaki - Founder, SH Consulting KK
  • Cong-Kha Pham - Professor, University of Electro-Communication

CryptospeC is a security system to protect sensitive information from unauthorized accesses. It consists of a macro cell module, a secure RTOS, service boxes, and server apps. A CryptospeC module as an isolated macro cell deeply integrated into a 64-bit RISC-V system to manage its security, which constitutes a cryptographic boundary. The module prevents CPUs (e.g. RV64GC) from running unauthorized software by controlling their clock, reset and signals related to activations. Cryptocell module interfaces to RISC-V Coreplex via wide tilelink interconnects and a hardware mailbox to achieve higher performance in symmetric and asymmetric crypto. We design the module to be FIPS140-2 certifiable. A CryptospeC module consists of one Secure MCU (RV64IMAC) and one SH-2 real-time MCU. Secure RTOS measures bootloader and OSes against stored keys and previous boot records in an encrypted file system to determines CPUs' root of trust. The module's RTOS ensures system integrity against electric, magnetic and physical system tears (e.g. power termination). A mailbox separates cryptographic module's memory space and coreplex memory space. CryptospeC includes system servers and blackboxes. CryptospeC Secure OS manages initial and subsequent key injection accepts CPU host commands, download user-defined secure applications, and handle all events.

16:05 - 16:20 15 mins
Energy-Efficient Face Detection Using Andes RISC-V Processor
  • Chien-Hao Chen - Master Student, Si2 Lab, Department of Electronics Engineering, NCTU
  • Po Yu Huang - Master Student, Si2 Lab, Department of Electronics Engineering, NCTU

This talk presents an energy-efficient face detection (FD) model with real-time processing on an Andes RISC-V processor. Both region-of-interest (ROI) detection and shallow pipelined models have been developed to reduce overall computational complexity. In addition, algorithm transformation has been conducted to further reduce complex operations while maintaining acceptable detection accuracy Finally, computation-intensive parts are identified and explored to investigate the feasibility of parallelism by taking available memory bandwidth into account. For real-time face detection, our proposal achieves at least 16 times speedup over the well-known MTCNN model with model size reduced from 1.95 M to 0.19 M, making it very suitable for hardware-constrained systems. The proposed FD solution has also been successfully demonstrated on an Andes RISC-V processor with Andes Neural Network Library using the proposed P-extension (DSP/SIMD instructions) in an FPGA-based platform with the ability to detect multiple faces for 640X480 video sequences. The speedups at various steps including the application of DSP instructions will be presented.

16:20 - 16:45 25 mins
A Different World: a Blockchain-Focused, General-Purpose Applicable Software Sandbox System Based on RISC-V
  • Xuejie Xiao - Blockchain Engineer, Cryptape

We present CKB-VM, a software implementation of RISC-V used as the virtual machine solution for CKB, which also has the potential of becoming a general software sandbox solution. As a RISC-V standard compliant implementation, CKB-VM can be used to run arbitrary untrusted software securely without jeopardizing host environment. Compared to widely used sandbox solution such as V8, we believe a RISC-V based sandbox solution can provide greater benefits, since 1) it provides much lower level operations than, for example, JavaScript, which enables more optimizations; 2) it comes with state of the art tools for expressing complicated operations such as V extension for vector based calculation, and 3) it provides more transparent and immediate insights into runtime characteristics of the virtual machine. Those attributes make it a perfect fit as the underlying virtual machine for blockchains. In addition, with upstream gcc and (coming) LLVM support, it's easier to port existing software onto a RISC-V based sandbox than JavaScript-based solution via emscripten. While we primarily use CKB-VM in CKB, a public permissionless blockchain, we believe CKB-VM has the potential of becoming a much more general purpose sandbox solution for much wider use cases.

16:45 - 17:10 25 mins
Enabling TVM on RISC-V Architectures with SIMD Instructions
  • Allen Lu - AI compiler manager, Peakhills Group Corporation
  • Jenq-Kuen Lee - Professor, National Tsing-Hua University

TVM is an open, deep-learning compiler framework to be able to handle various AI models and frameworks such as MXNet, PyTorch, Tensorflow, CoreML, ONNX for MPUs, GPUs and specialized accelerators. In this work, we investigate the enabled flow for the TVM flow and stack on RISC-V with SIMD instructions. RISC-V is with two vector construct proposals, superword vector (V) and Subword SIMD vector (P) instructions to be used as a fall-back engine for AI computing. TVM is based on TVM IR originally from Halide IR. Thus it allows scheduling to be deployed for various operators with various architecture configurations. For the TVM on superword vector, we lower TVM IR to LLVM vector IR for RISC-V optimizations. For the case of Packed instructions, we need quantization scheduling methods to quantize AI models into fixed-point instruction for packed subword SIMD computations on RISC-V. In addition, we add the schedulers to generate SIMD intrinsics when TVM lowering to LLVM IR layer. Our experiment is done by integrating P and V instructions into Spike simulators. Early experiments for MatMul operators from AI models at TVM on RISC-V with Subword SIMD shows that we generate 104 SIMD instructions among 229 instructions.

17:10 - 17:30 20 mins
Poster Preview Sessions
  • Wen-Cong Huang - Student, National Taiwan University
  • Chia-Hsiang Yang - Professor, National Taiwan University
  • Nicolae Tusinchi - Product Specialist Design Verification, OneSpin Solutions
  • Xiang Wang - Libre Firmware Engineer, TYA Information Technology Co., Ltd. Hardened Linux Community
  • Shawn Chang - Open Source Security Consultant, TYA Information Technology Co., Ltd. Hardened Linux Community
  • Yiqun Sun - CTO, UC TECH IP
  • Liling Liao - Project Management, UC Tech IP
  • Alexander Kozlov - CTO, CloudBEAR
  • Kesami Hagiwara - PhD Student, University of Electro-Communication

Please join us for 3-minute previews of the poster sessions that will be displayed during the evening networking reception on Tuesday, March 12.

  • RISC-V Architecture Optimization through Extensible Instruction Sets and Custom Accelerators, Wen-Cong Huang, Student, National Taiwan University & Chia-Hsiang Yang, Professor, National Taiwan University
  • Unbounded Formal Verification of RISC V CSRs with Interval Property Checking, Nicolae Tusinchi, Product Specialist Design Verification, OneSpin Solutions 
  • Firmware Freedom: Coreboot for RISC-V, Xiang Wang, Libre Firmware Engineer, TYA Information Technology Co., Ltd. Hardened Linux Community & Shawn Chang, Open Source Security Consultant, TYA Information Technology Co., Ltd. Hardened Linux Community
  • One Rocket Architecture-Based SoC Chip on 55nm Technologies and Its Future Evolution, Yiqun Sun, CTO, UC Tech IP & Liling Kao, Project Management, UC Tech IP
  • Implementing 64-bit RISC-V Chip with MMU, L1 and L2 Memories Using Academic Shuttle in Japan, Kesami Hagiwara, Ph.D. Student, The University of Electro-Communications  
  • CloudBEAR Processor IP Product Line, Alexander Kozlov, CTO, CloudBEAR
17:30 - 19:30 120 mins
Networking Reception & Tabletop Visit