The need for security and virtualization capabilities in modern cyber-physical systems is increasing and plays a crucial role in their design. During the last years, several software-based techniques have been proposed to achieve isolation and security features, offering secure computing services and storing confidential/sensible data together with the execution of multiple software components on the same platform. Notably, such architectures are typically denoted as systems with Multiple Independent Levels of Security (MILS). However, due to the increase of software complexity and the exposure of modern systems by means of connectivity infrastructures, security became a fundamental design objective, originating strong functional and reliab...
As virtualization enhances the use of computing and scalability of computing resources it's importan...
There is an ongoing trend in several embedded industries to consolidate multiple subsystems onto t...
While security has become important in embedded systems, commodity operating systems often fail in e...
This paper proposes a novel design to enable the virtualization of both secure and non-secure worlds...
peer-reviewedTrusted Computing is a relatively new approach to computer security in which a system s...
A hypervisor provides secure separation of multiple virtual machines on a device, thus removing conf...
The business world is exhibiting a growing dependency on computer systems, their operations and th...
Virtualization has been used in computer servers for a long time as a means to improve utilization, ...
Virtual Machine Monitors (VMMs), also called hypervisors,can be used to construct a trusted computin...
The advances and adoption of Trusted Computing and hardware assisted virtualisation technologies in ...
National audienceAs far as one is concerned by security in virtual embedded systems, one can say tha...
The growing demand of new functionalities in modern embedded real-time systems has led chip makers t...
This paper presents the first results from the ongoing research project HASPOC, developing a high as...
With the advent of the mobile industry, we face new security challenges. ARM architecture is deploye...
As virtualization enhances the use of computing and scalability of computing resources it's importan...
There is an ongoing trend in several embedded industries to consolidate multiple subsystems onto t...
While security has become important in embedded systems, commodity operating systems often fail in e...
This paper proposes a novel design to enable the virtualization of both secure and non-secure worlds...
peer-reviewedTrusted Computing is a relatively new approach to computer security in which a system s...
A hypervisor provides secure separation of multiple virtual machines on a device, thus removing conf...
The business world is exhibiting a growing dependency on computer systems, their operations and th...
Virtualization has been used in computer servers for a long time as a means to improve utilization, ...
Virtual Machine Monitors (VMMs), also called hypervisors,can be used to construct a trusted computin...
The advances and adoption of Trusted Computing and hardware assisted virtualisation technologies in ...
National audienceAs far as one is concerned by security in virtual embedded systems, one can say tha...
The growing demand of new functionalities in modern embedded real-time systems has led chip makers t...
This paper presents the first results from the ongoing research project HASPOC, developing a high as...
With the advent of the mobile industry, we face new security challenges. ARM architecture is deploye...
As virtualization enhances the use of computing and scalability of computing resources it's importan...
There is an ongoing trend in several embedded industries to consolidate multiple subsystems onto t...
While security has become important in embedded systems, commodity operating systems often fail in e...