With the advent of the mobile industry, we face new security challenges. ARM architecture is deployed in most mobile phones, homeland security, IoT, autonomous cars and other industries, providing a hypervisor API (via virtualization extension technology). To research the applicability of this virtualization technology for security in this platform is an interesting endeavor. The hypervisor API is an addition available for some ARMv7-a and is available with any ARMv8-a processor. Some ARM platforms also offer TrustZone, which is a separate exception level designed for trusted computing. However, TrustZone may not be available to engineers as some vendors lock it. We present a method of applying a thin hypervisor technology as a generic secu...
This paper presents the first results from the ongoing research project HASPOC, developing a high as...
National audienceAs far as one is concerned by security in virtual embedded systems, one can say tha...
peer-reviewedTrusted Computing is a relatively new approach to computer security in which a system s...
Abstract—As the ARM architecture has become the favored platform for the fastest growing computing s...
Abstract—Security threats on consumer devices such as mobile phones are increasing as the software p...
Security threats on consumer devices such as mobile phones are increasing as the software platforms ...
MasterAs the embedded system is applied in various fields, the rate of use of smart devices such as ...
MasterIn the era of IoT (Internet of Things), embedded devices ranging from mobile devices, e.g. mob...
This paper proposes a novel design to enable the virtualization of both secure and non-secure worlds...
The business world is exhibiting a growing dependency on computer systems, their operations and th...
Embedded systems are being adopted in applications requiring mixed levels of criticality and securit...
The arrival of smart phones has created the new era in communication between users and internet. Sma...
In recent years, powerful handheld computing devices such as personal digital assistants and mobile ...
Virtualization has grown increasingly popular, thanks to its benefits of isolation, management, and ...
The need for security and virtualization capabilities in modern cyber-physical systems is increasing...
This paper presents the first results from the ongoing research project HASPOC, developing a high as...
National audienceAs far as one is concerned by security in virtual embedded systems, one can say tha...
peer-reviewedTrusted Computing is a relatively new approach to computer security in which a system s...
Abstract—As the ARM architecture has become the favored platform for the fastest growing computing s...
Abstract—Security threats on consumer devices such as mobile phones are increasing as the software p...
Security threats on consumer devices such as mobile phones are increasing as the software platforms ...
MasterAs the embedded system is applied in various fields, the rate of use of smart devices such as ...
MasterIn the era of IoT (Internet of Things), embedded devices ranging from mobile devices, e.g. mob...
This paper proposes a novel design to enable the virtualization of both secure and non-secure worlds...
The business world is exhibiting a growing dependency on computer systems, their operations and th...
Embedded systems are being adopted in applications requiring mixed levels of criticality and securit...
The arrival of smart phones has created the new era in communication between users and internet. Sma...
In recent years, powerful handheld computing devices such as personal digital assistants and mobile ...
Virtualization has grown increasingly popular, thanks to its benefits of isolation, management, and ...
The need for security and virtualization capabilities in modern cyber-physical systems is increasing...
This paper presents the first results from the ongoing research project HASPOC, developing a high as...
National audienceAs far as one is concerned by security in virtual embedded systems, one can say tha...
peer-reviewedTrusted Computing is a relatively new approach to computer security in which a system s...