RISC-V’s Rise: NVIDIA, Qualcomm, Google and Samsung Challenge Intel and AMD with Open-Source Computing

7 min read
RISC-V’s Rise: NVIDIA, Qualcomm, Google and Samsung Challenge Intel and AMD with Open-Source Computing

The RISC-V Summit 2024 held in Santa Clara, California, was a watershed moment in the evolution of open-source computing. Leading companies such as NVIDIA, Qualcomm, Google, and Samsung highlighted their progress with RISC-V architecture—a technology that promises to reshape the computing landscape by challenging the dominance of x86 and ARM processors.

One of the summit’s standout announcements was that Linux 6.12 will include generic CPU vulnerability reporting for RISC-V processors, elevating its security profile to meet modern demands. Security has always been a challenge for complex CPU architectures, and RISC-V's proactive measures reflect the industry's shift towards transparent, open computing.

In this blog, we will explore the foundations of RISC-V, its adoption by leading companies, CPU security challenges, the importance of vulnerability reporting in Linux, and how RISC-V’s open-source model benefits users, developers, and hardware manufacturers alike.

What Is RISC-V? A Primer on the Open-Source Processor Architecture

RISC-V (pronounced "risk-five") is an open-source instruction set architecture (ISA) that was initially developed at the University of California, Berkeley in 2010. Unlike traditional ISAs like x86 (Intel/AMD) or ARM, which require licensing fees, RISC-V is free to use and open for anyone to modify.

If you're interested in learning more about RISC-V a groundbreaking open standard instruction set architecture, please visit this Wikipedia page for comprehensive information.

What Is an Instruction Set Architecture (ISA)?

At its core, an ISA is the blueprint that defines how a CPU interprets and executes instructions. It lays out the essential rules for hardware-software interaction, including how the CPU manages memory, processes data, and communicates with other components.

RISC stands for Reduced Instruction Set Computer—a design philosophy that uses a simpler set of instructions to improve processing efficiency and performance. Unlike Complex Instruction Set Computing (CISC) architectures, such as x86, RISC-based processors are easier to implement, more energy-efficient, and highly customizable.

Why RISC-V Matters in Modern Computing

RISC-V's modularity allows manufacturers to tailor processors for specific applications, including AI, automotive systems, IoT devices, and embedded controllers. Its royalty-free nature removes licensing barriers, reducing production costs while empowering smaller companies and research institutions to innovate.

Industry Leaders Embrace RISC-V: Applications Across Sectors

At the summit, NVIDIA, Qualcomm, Google, and Samsung showcased their advancements with RISC-V. These companies are leading a wave of collaborative development that highlights the versatility and disruptive potential of the architecture.

NVIDIA: Redefining GPU Design with RISC-V

NVIDIA, known for its cutting-edge graphics processing units (GPUs), has been quietly using RISC-V-based microcontrollers in its hardware for almost ten years. These microcontrollers handle tasks like power management, temperature regulation, and fault monitoring within the GPU.

During the summit, NVIDIA presented “One Architecture, Dozens of Applications, Billions of Processors,” where it explained how RISC-V’s modular design allowed it to integrate specialized microcontrollers into various GPU models. This approach enables NVIDIA to develop customized, efficient processors for AI workloads, gaming, and professional visualization tools.

NVIDIA’s experience illustrates how open-source architectures enable faster product development by reducing reliance on proprietary technology. With RISC-V, companies like NVIDIA can innovate rapidly, free from licensing constraints.

Qualcomm and Samsung: Driving RISC-V Adoption in Mobile and Embedded Systems

Qualcomm, a leader in mobile computing, announced at the summit that it is using RISC-V to refine instruction sets for high-performance AI chips. Qualcomm's engineers explained how RISC-V's flexible ISA allows them to build AI-capable processors that emphasize both security and speed, critical for applications such as 5G networks and mobile computing.

Meanwhile, Samsung showcased the integration of RISC-V CPUs into its embedded systems—computers within devices like smart appliances, wearables, and automotive electronics. Samsung revealed how Samsung Foundry is helping clients design cutting-edge RISC-V chips with optimized performance for specific applications, such as low-power sensors and autonomous vehicle control units.

Google DeepMind: Building the Next Generation of AI Accelerators

Google DeepMind shared insights on its use of RISC-V-based Tensor Processing Units (TPUs)—specialized hardware designed for AI and machine learning workloads. RISC-V’s open-source nature allows Google to customize TPUs for faster execution of complex neural networks. Representatives from DeepMind discussed the challenges they encountered, including power optimization and software integration, and how collaborative development with the open-source community enabled faster problem-solving.

Google’s work with AI accelerators reflects a broader industry shift toward customized hardware that fits specific workloads, emphasizing the importance of flexible, open architectures.

Challenges with Traditional CPUs: Security Flaws and Performance Bottlenecks

Historically, x86 and ARM processors have dominated the computing landscape. While these architectures offer high performance, their complex designs introduce vulnerabilities that attackers can exploit.

Side-Channel Attacks and Speculative Execution Vulnerabilities

One of the most significant CPU vulnerabilities in recent years has been side-channel attacks like Spectre and Meltdown. These attacks exploit the speculative execution feature found in most modern processors.

  • Speculative execution allows CPUs to predict future tasks to improve speed. However, it also exposes sensitive data if improperly handled.
  • Side-channel attacks extract information by observing how systems behave, such as analyzing power consumption, electromagnetic emissions, or execution timing.

These vulnerabilities highlight a critical flaw: performance optimization often comes at the cost of security. As CPUs become more complex, they also become harder to secure.

RISC-V’s Security Evolution: Vulnerability Reporting in Linux 6.12

With Linux 6.12, RISC-V will gain generic CPU vulnerability reporting, aligning with the standards of x86 and ARM processors. This feature provides real-time visibility into the security status of RISC-V machines, helping both developers and users stay ahead of emerging threats.

How Generic CPU Vulnerability Reporting Works

In Linux, CPU vulnerability reporting is managed through the /sys/devices/system/cpu/vulnerabilities/ directory. This directory:

  • Lists known vulnerabilities for the processor.
  • Indicates whether mitigations are in place for those vulnerabilities.
  • Provides transparency about the security posture of the system.

This feature allows developers to track and address vulnerabilities efficiently, ensuring RISC-V machines remain secure in the face of new threats.

The Open-Source Advantage: RISC-V’s Community-Driven Security Model

One of RISC-V’s greatest strengths lies in its open-source nature. Unlike proprietary architectures, RISC-V’s instruction set is freely available, allowing anyone to inspect, modify, and contribute to its development.

Faster Issue Resolution Through Collaboration

RISC-V leverages a global community of developers to identify vulnerabilities and deploy fixes quickly. Recent contributions from companies like Huawei and Rivos demonstrate how collaborative security efforts benefit everyone by reducing the time between vulnerability detection and resolution.

Building Trust Through Transparency

Users can verify the security of their systems by inspecting RISC-V code, ensuring there are no hidden flaws or backdoors. This transparency fosters trust and encourages wider adoption, particularly in sectors where security is paramount, such as defense, healthcare, and financial services.

Future-Proofing RISC-V: The Promise of Socketed Processors

Looking to the future, RISC-V’s modular architecture opens exciting possibilities for sustainable hardware development. One potential innovation is the creation of socketed RISC-V processors, which allow users to replace individual components instead of the entire CPU when vulnerabilities are discovered or new features are needed.

Sustainability Through Modular Design

Socketed processors can extend the lifespan of computing devices, reducing electronic waste and aligning with global efforts toward environmental sustainability. This approach also offers cost savings for enterprises by minimizing the need for complete hardware replacements.

Conclusion: RISC-V's Bright Future in Secure, Open Computing

RISC-V’s adoption of vulnerability reporting in Linux 6.12 marks a significant milestone, reflecting the architecture’s maturation in both performance and security. As industry giants like NVIDIA, Google, Samsung, and Qualcomm continue to invest in RISC-V, the architecture is poised to become a mainstream alternative to x86 and ARM.

By embracing open-source principles, proactive security measures, and sustainable design practices, RISC-V offers a compelling vision of the future of computing—one that is flexible, transparent, and secure. As the ecosystem grows, RISC-V has the potential to reshape the computing landscape, benefiting developers, users, and the environment alike.

Want to write a blog?

Unfold your thoughts and let your ideas take flight in the limitless realm of cyberspace. Whether you're a seasoned writer or just starting, our platform offers you the space to share your voice, connect with a creative community and explore new perspectives. Join us and make your mark!

Follow us on social media

Cyber Unfolded Light Logo
Copyright © 2024 CYUN. All rights reserved.