Efficient memory access control is pivotal for digital system security, impacting diverse domains such as mobile/desktop software, network security, and critical system security. This study presents a RISC-V Based Sequence Detector in System Verilog, aiming to optimize memory access control performance. Leveraging the RISC-V instruction set architecture (ISA) and advanced coding practices, the proposed sequence detector guarantees improved speed and precision compared to conventional methods. By adeptly managing input sequences, the sequence detector enables precise memory access control whereas following to advanced coding standards with RISC-V ISA. The adoption of System Verilog not only modernizes coding practices but also significantly boosts the speed of the sequence detector, underscoring its potential for enhancing overall system efficiency and security. This progression represents a significant leap forward in digital system security, offering increased responsiveness, reducing delay by 1.02 ns, displaying a robust solution to digital system challenges and promising expanded effectiveness in Memory Access Control systems through streamlined design and contemporary coding methods.

1.
Mundada
,
S. G.
(
2020
).
Design of Sequence Detector using Finite State Machine
.
International Journal of Advanced Trends in Computer Science and Engineering
,
9
(
1
),
852
858
.
2.
Singhvi
,
A.
,
Akella
,
A.
,
Gibson
,
D.
,
Wenisch
,
T. F.
,
Wong-Chan
,
M. C.
,
Clark
,
S.
,
Martin
,
M. M. K.
,
McLaren
,
M.
,
Chandra
,
P.
,
Cauble
,
R.
,
Wassel
,
H. M. G.
,
Montazeri
,
B.
,
Sabato
,
S. L.
,
Scherpelz
,
J.
, &
Vahdat
,
A.
(
2020
).
1RMA: Re-envisioning Remote Memory Access for Multi-tenant Datacenters
.
SIGCOMM ’20: Proceedings of the Annual Conference of the ACM Special Interest Group on Data Communication on the Applications, Technologies, Architectures, and Protocols for Computer Communication July 2020
.
3.
Divya
,
B.
(
2020
).
Design of High Speed Sequence Detector using Verilog
.
International Journal for Research in Applied Science and Engineering Technology
,
8
(
7
),
609
614
.
4.
Sabeenian
,
D.
,
Harirajkumar
,
J.
, &
Cruz
,
L. D.
(
2019
).
Transition from Holistic to Deep learning Face Recognition Methods
.
International Journal of Recent Technology and Engineering, 8
(
4
),
3111
3116
.
5.
Munir
,
F.
,
Waseem
,
M.
,
Khan
,
Z. A.
,
Majeed
,
S.
,
Farooq
,
U.
, &
Shahzad
,
S. A.
(
2022
).
Synthesis of AIEE active triazine based new fluorescent and colorimetric probes: A reversible mechanochromism and sequential detection of picric acid and ciprofloxacin
.
Journal of Photochemistry and Photobiology. A, Chemistry
,
429
,
113921
.
6.
R
,
R. V.
,
Aravind
,
A.
,
Praveenraj
,
M.
, &
Ramesh
,
S. R.
(
2022
).
Multi-Car Parking System Using Verilog
.
2022 International Conference on Wireless Communications Signal Processing and Networking (WiSPNET).
7.
Kılınççeker
,
O.
,
Turk
,
E.
,
Belli
,
F.
, &
Challenger
,
M.
(
2021
).
Model-based ideal testing of hardware description language (HDL) programs
.
Software and Systems Modeling
,
21
(
3
),
1209
1240
.
8.
Vijayashaarathi
,
S.
,
Tamilselvam
,
V.
,
Saranya
,
K.
,
Harirajkumar
,
J.
, &
Satheeskumar
,
L.
(
2023
).
Optimized Arithmetic and Logical Unit Design using Reversible Logic Gates
.
2023 2nd International Conference on Applied Artificial Intelligence and Computing (ICAAIC).
9.
Lee
,
H.
,
Song
,
Y.
, &
Lee
,
K.
(
2022
).
Modeling of nano-scale PLL using Verilog HDL
.
2022 13th International Conference on Information and Communication Technology Convergence (ICTC)
.
10.
Almakhour
,
M.
,
Sliman
,
L.
,
Samhat
,
A. E.
, &
Mellouk
,
A.
(
2023
).
A formal verification approach for composite smart contracts security using FSM
.
Journal of King Saud University. Computer and Information Sciences/Maǧalaẗ Ǧam’aẗ Al-malīk Saud : Ùlm Al-ḥasib Wa Al-ma’lumat
,
35
(
1
),
70
86
.
11.
Salauyou
,
V.
(2023b).
Structural Models for Fault Detection of Moore Finite State Machines
.
Springer, Cham
,
231
241
.
12.
Kibria
,
R.
,
Farahmandi
,
F.
, &
Tehranipoor
,
M.
(
2023
).
FSMX-Ultra: Finite state machine extraction from Gate- Level NetList for security assessment
.
IEEE Transactions on Computer-aided Design of Integrated Circuits and Systems
,
42
(
11
),
3613
3627
.
13.
Bazzi
,
J.
,
Sweidan
,
J.
,
Fouda
,
M. E.
,
Kanj
,
R.
, &
Eltawil
,
A. M.
(
2022b
).
Efficient analog CAM design
.
arXiv (Cornell University).
14.
Kibria
,
R.
,
Farzana
,
N.
,
Farahmandi
,
F.
, &
Tehranipoor
,
M.
(
2022
).
FSMx: Finite State Machine Extraction from Flattened Netlist With Application to Security
.
2022 IEEE 40th VLSI Test Symposium (VTS).
15.
Sugadev
,
M.
,
Rayen
,
S. J.
,
Harirajkumar
,
J.
,
Rathi
,
R.
,
Anitha
,
G.
,
Ramesh
,
S.
, &
Ramaswamy
,
K.
(
2022
).
Implementation of Combined Machine Learning with the Big Data Model in IoMT Systems for the Prediction of Network Resource Consumption and Improving the Data Delivery
.
Computational Intelligence and Neuroscience
,
2022
,
1
12
.
16.
Abu-Jassar
,
A. T.
,
Attar
,
H.
,
Lyashenko
,
V.
,
Amer
,
A.
,
Sotnik
,
S.
, &
Solyman
,
A. a. A.
(
2023
).
Access Control to Robotic Systems Based on Biometric: The Generalized Model and its Practical Implementation
.
International Journal of Intelligent Engineering and Systems
,
16
(
5
),
313
328
.
17.
Naha
,
A.
,
Teixeira
,
A.
,
Åhlén
,
A.
, &
Dey
,
S.
(
2020
).
Sequential detection of Replay attacks
.
arXiv (Cornell University).
18.
Mestav
,
K. R.
,
Wang
,
X.
, &
Tong
,
L.
(
2020
).
A Deep learning Approach to Anomaly Sequence Detection for High-Resolution Monitoring of Power Systems
.
arXiv (Cornell University).
19.
Majeed
,
B.
,
Ryan
,
C.
,
McEllin
,
J.
,
Youssef
,
A.
,
Dias
,
D. M.
,
Murphy
,
A.
, &
Da Silva
Carvalho
, S. (
2023
).
Evolving Behavioural Level Sequence Detectors in SystemVerilog Using Grammatical Evolution
.
Proceedings of the 15th International Conference on Agents and Artificial Intelligence -
Volume
3
: ICAART.
20.
Perumal
,
V. K.
, &
Ramesh
,
J.
(
2022
).
High Speed and Area Efficient Address Generator architecture for WiMAX Deinterleaver
.
Research Square (Research Square).
21.
Monteiro
,
N. R. C.
,
Pereira
,
T.
,
Machado
,
A.
,
Oliveira
,
J. L.
,
Abbasi
,
M.
, &
Arrais
,
J. P.
(
2023
).
FSM-DDTR: End-to-end feedback strategy for multi-objective De Novo drug design using transformers
.
Computers in Biology and Medicine
,
164
,
107285
.
22.
Kabulov
,
A.
,
Saymanov
,
I.
,
Yarashov
,
I.
, &
Karimov
,
A.
(
2022
).
Using algorithmic modeling to control user access based on functioning table
.
2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS)
.
23.
Iqbal
,
U.
, &
Mir
,
A. H.
(
2022
).
Secure and practical access control mechanism for WSN with node privacy
.
Journal of King Saud University. Computer and Information Sciences/Maǧalaẗ Ǧam’aẗ Al-malīk Saud : Ùlm Al- ḥasib Wa Al-ma’lumat
,
34
(
6
),
3630
3646
.
24.
Divyanshu
,
D.
,
Kumar
,
R.
,
Khan
,
D.
,
Amara
,
S.
, &
Massoud
,
Y.
(
2023a
).
FSM inspired unconventional hardware watermark using Field-Assisted SOT-MTJ
.
IEEE Access
,
11
,
8150
8158
.
25.
Wang
,
C.
,
He
,
K.
,
Fan
,
R.
,
Wang
,
X.
,
Wang
,
W.
, &
Hao
,
Q.
(
2023
).
CXL over Ethernet: A Novel FPGA-based Memory Disaggregation Design in Data Centers
.
2023 IEEE 31st Annual International Symposium on Field- Programmable Custom Computing Machines (FCCM)
.
26.
Perumal
,
V. K.
,
Ramesh
,
J.
, &
Krishnan
,
T.
(
2022
).
VLSI implementation of high speed multiplier architecture using VHBCSE algorithm for DSP applications
.
Analog Integrated Circuits and Signal Processing
,
113
(
3
),
307
313
.
27.
Jain
,
S.
,
Yeleswarapu
,
N.
,
Maruf
,
H. A.
, &
Gupta
,
R.
(
2024
).
Memory Sharing with CXL: Hardware and Software Design Approaches
.
arXiv (Cornell University).
28.
Bera
,
B.
,
Chattaraj
,
D.
, &
Das
,
A. K.
(
2020
).
Designing secure blockchain-based access control scheme in IoT- enabled Internet of Drones deployment
.
Computer Communications
,
153
,
229
249
.
29.
Semal
,
B.
,
Markantonakis
,
K.
,
Akram
,
R. N.
, &
Kalbantner
,
J.
(
2020
).
Leaky Controller: Cross-VM memory controller covert channel on multi-core systems
. In
IFIP advances in information and communication technology
(pp.
3
16
).
This content is only available via PDF.
You do not currently have access to this content.