Detecting RISC-V hardware attacks using instruction opcodes with QEMU

Other authors

Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors

Universitat Politècnica de Catalunya. Departament d'Enginyeria Minera, Industrial i TIC

Universitat Politècnica de Catalunya. CRAAX - Centre de Recerca d'Arquitectures Avançades de Xarxes

Universitat Politècnica de Catalunya. PM - Programming Models

Universitat Politècnica de Catalunya. CROMAI - Computing Resources Orchestration and Management for AI

Publication date

2026-01-27



Abstract

Póster presentado en HiPEAC 2026 (Cracovia)


As malware becomes more advanced, there is a growing need for more accurate and robust detection systems. Artificial Intelligence (AI) techniques, particularly those based on machine learning and deep learning, have emerged as powerful tools for identifying and classifying malicious behavior. Can we detect RISC-V Hardware Attacks using a machine learning model analyzing sequences of executed instructions? This work builds a suitable dataset, trains machine learning models and evaluates models in 2 scenarios: known and zero-day attacks, showing that known attacks can be detected with a high accuracy, while zero-day attacks may be detected but depends on the similarity with other trained attacks.


Funded by the European Union. Project number: 101093062.


Preprint

Document Type

External research report

Language

English

Related items

info:eu-repo/grantAgreement/EC/HE/101093062/EU/Virtual Environment and Tool-boxing for Trustworthy Development of RISC-V based Cloud Services/Vitamin-V

Recommended citation

This citation was generated automatically.

Rights

Open Access

This item appears in the following Collection(s)

E-prints [72896]