Many embedded systems lack a memory management unit (MMU) and thus often also lack protection of memory. This causes these systems to be less robust since the operating system (OS), processes, and threads are no longer isolated from each other. This is also a potential security issue and with the number of embedded systems rapidly increasing as a result of the rise of Internet of things (IoT), vulnerabilities like this could become a major problem. However, with a recent update to the RISC-V processor architecture, a possibility to isolate regions of memory without an MMU was introduced. This study aims to identify problems and possibilities of implementing such memory protection with RISC-V. Based on a study of literature and documentation...
Internet of Things (IoT) blir allt vanligare i dagens samhälle. Allt fler vardagsenheter blir uppkop...
During the last years the number of Electrical Control Units (ECU) in vehicles have increased rapidl...
International audienceThis article presents a hardware-based memory isolation solution for constrain...
Many embedded systems lack a memory management unit (MMU) and thus often also lack protection of mem...
Operativsystemer for innvevde enheter er vanligvis enten fullt utstyrte operativsystemer, som Linux,...
In dealing with inefficient operation system in today’s e-business environment, the paper focuses on...
This dissertation explores the use of capability security hardware and software in real-time and lat...
The car industry has created a series of standards called AutoSAR as a response to the increasing nu...
Internet of things (IoT) devices are appearing in all aspects of our digital life. As such, they hav...
A processor plays an important role in the security of an entire embedded system. There are two reas...
I denne masteroppgaven beskriver vi implementasjonen av et datasystem som baserer seg på RISC-V inst...
In the embedded world, there are some types of applications which needed to perform with higher accu...
Jedinica za zaštitu memorije je sklopovska komponenta mikroprocesora koja razdvaja dijelove memorije...
With reference to the typical hardware configuration of a sensor node, we present the architecture o...
The trustworthiness of microcontroller-class devices is crucial for a growing spectrum of applicatio...
Internet of Things (IoT) blir allt vanligare i dagens samhälle. Allt fler vardagsenheter blir uppkop...
During the last years the number of Electrical Control Units (ECU) in vehicles have increased rapidl...
International audienceThis article presents a hardware-based memory isolation solution for constrain...
Many embedded systems lack a memory management unit (MMU) and thus often also lack protection of mem...
Operativsystemer for innvevde enheter er vanligvis enten fullt utstyrte operativsystemer, som Linux,...
In dealing with inefficient operation system in today’s e-business environment, the paper focuses on...
This dissertation explores the use of capability security hardware and software in real-time and lat...
The car industry has created a series of standards called AutoSAR as a response to the increasing nu...
Internet of things (IoT) devices are appearing in all aspects of our digital life. As such, they hav...
A processor plays an important role in the security of an entire embedded system. There are two reas...
I denne masteroppgaven beskriver vi implementasjonen av et datasystem som baserer seg på RISC-V inst...
In the embedded world, there are some types of applications which needed to perform with higher accu...
Jedinica za zaštitu memorije je sklopovska komponenta mikroprocesora koja razdvaja dijelove memorije...
With reference to the typical hardware configuration of a sensor node, we present the architecture o...
The trustworthiness of microcontroller-class devices is crucial for a growing spectrum of applicatio...
Internet of Things (IoT) blir allt vanligare i dagens samhälle. Allt fler vardagsenheter blir uppkop...
During the last years the number of Electrical Control Units (ECU) in vehicles have increased rapidl...
International audienceThis article presents a hardware-based memory isolation solution for constrain...