While security has become important in embedded systems, commodity operating systems often fail in effectively separating processes, mainly due to a too large trusted computing base. System virtualization can establish isolation already with a small code base, but many existing embedded CPU architectures have very limited virtualization hardware support, so that the performance impact is often non-negligible. Targeting both security and performance, we investigate an approach in which a few minor hardware additions together with virtualization offer protected execution in embedded systems while still allowing non-virtualized execution when secure services are not needed. Benchmarks of a prototype implementation on an emulated ARM Cortex A8 ...
Virtualization is a mature technology in server and desktop environments where multiple systems are ...
This paper presents the first results from the ongoing research project HASPOC, developing a high as...
The isolation of security critical components from an untrusted OS allows to both protect applicatio...
While security has become important in embedded systems, commodity operating systems often fail in e...
While security has become important in embedded systems, commodity operating systems often fail in e...
National audienceAs far as one is concerned by security in virtual embedded systems, one can say tha...
The need for security and virtualization capabilities in modern cyber-physical systems is increasing...
Virtualization has been used in computer servers for a long time as a means to improve utilization, ...
Many embedded systems have relatively strong security requirements because they handle confidential ...
Over the last years, security-kernels have played a promising role in reshaping the landscape of pla...
Multi- and many-core processors are becoming increasingly popular in embedded systems. Many of these...
Our work aims to extend the concept of virtualization, which is known from the context of operating ...
A promising approach for designing critical embedded systems is based on virtualization technologies...
Recent developments in embedded platforms and growing complexity of embedded applications have fathe...
With commodity operating systems failing to establish unbreakable isolation of processes, there is a...
Virtualization is a mature technology in server and desktop environments where multiple systems are ...
This paper presents the first results from the ongoing research project HASPOC, developing a high as...
The isolation of security critical components from an untrusted OS allows to both protect applicatio...
While security has become important in embedded systems, commodity operating systems often fail in e...
While security has become important in embedded systems, commodity operating systems often fail in e...
National audienceAs far as one is concerned by security in virtual embedded systems, one can say tha...
The need for security and virtualization capabilities in modern cyber-physical systems is increasing...
Virtualization has been used in computer servers for a long time as a means to improve utilization, ...
Many embedded systems have relatively strong security requirements because they handle confidential ...
Over the last years, security-kernels have played a promising role in reshaping the landscape of pla...
Multi- and many-core processors are becoming increasingly popular in embedded systems. Many of these...
Our work aims to extend the concept of virtualization, which is known from the context of operating ...
A promising approach for designing critical embedded systems is based on virtualization technologies...
Recent developments in embedded platforms and growing complexity of embedded applications have fathe...
With commodity operating systems failing to establish unbreakable isolation of processes, there is a...
Virtualization is a mature technology in server and desktop environments where multiple systems are ...
This paper presents the first results from the ongoing research project HASPOC, developing a high as...
The isolation of security critical components from an untrusted OS allows to both protect applicatio...