Why RISC-V is a viable option for safety-critical applications
By Jay Thomas, Technical Development Manager, LDRA
EDN (February 14, 2025)
As safety-critical systems become increasingly complex, the choice of processor architecture plays an important role in ensuring functional safety and system reliability. Consider an automotive brake-by-wire system, where sensors detect the pedal position, software interprets the driver’s intent, and electronic controls activate the braking system. Or commercial aircraft relying on flight control computers to interpret pilot inputs and maintain stable flight. Processing latencies or failures in these systems could result in unintended behaviors and degraded modes, potentially leading to fatal accidents.
The RISC-V architecture’s inherent characteristics—modularity, simplicity, and extensibility—align with the demands of functional safety standards like ISO 26262 for automotive applications and DO-178C for aviation software. Unlike proprietary processor architectures, RISC-V is an open standard instruction set architecture (ISA) developed by the University of California, Berkeley, in 2011. The architecture follows reduced instruction set computing (RISC) principles, emphasizing performance and modularity in processor design.
RISC-V is set apart by its open, royalty-free nature combined with a clean-slate design that eliminates the legacy compatibility constraints of traditional architectures. The ISA is structured as a small base integer set with optional extensions, allowing processor designers to implement only the features needed for their specific applications.
This article examines the technical advantages and considerations of implementing RISC-V in safety-critical environments.
To read the full article, click here
Related Semiconductor IP
- Complete, PQC-focused, Root-of-Trust security solution
- xSPI (Expanded Serial Peripheral Interface) Verification IP
- XMBus Verification IP
- XLGMII 40G Ethernet Verification IP
- 10G XAUI/10GBase-KX4 Ethernet Verification IP
Related White Papers
- Validating Software in Commercial Smart Transmitter for Safety-Critical Applications
- A guide to accelerating applications with just-right RISC-V custom instructions
- Designing a CE-ATA Verification Environment for SoC Applications
- Find out what's really inside the iPod; Reuse of components is a good design practice for similar applications, including mobile handsets