Virtualization has grown increasingly popular, thanks to its benefits of isolation, management, and utilization, supported by hardware advances. It is also receiving attention for its potential to support security, through hypervisor-based services and advanced protections supplied to guests. Today, virtualization is even making inroads in the embedded space, and embedded systems, with their security needs, have already started to benefit from virtualization’s security potential. In this thesis, we investigate the possibilities for thin hypervisor-based security on embedded platforms. In addition to significant background study, we present implementation of a low-footprint, thin hypervisor capable of providing security protections to a sing...
peer-reviewedTrusted Computing is a relatively new approach to computer security in which a system s...
The need for security and virtualization capabilities in modern cyber-physical systems is increasing...
Virtualization is the predominant enabling technology of current cloud infrastructures and brings un...
Virtualization has grown increasingly popular, thanks to its benefits of isolation, management, and ...
Virtualization has been used in computer servers for a long time as a means to improve utilization, ...
MasterIn the era of IoT (Internet of Things), embedded devices ranging from mobile devices, e.g. mob...
National audienceAs far as one is concerned by security in virtual embedded systems, one can say tha...
With the advent of the mobile industry, we face new security challenges. ARM architecture is deploye...
The business world is exhibiting a growing dependency on computer systems, their operations and th...
Recent developments in embedded platforms and growing complexity of embedded applications have fathe...
Security threats on consumer devices such as mobile phones are increasing as the software platforms ...
Virtual machine monitors (VMMs), including hypervisors, are a popular platform for implementing vari...
The isolation of security critical components from an untrusted OS allows to both protect applicatio...
Abstract—This paper addresses an essential application of microkernels; its role in virtualization f...
Virtual Machine Monitors (VMMs), also called hypervisors,can be used to construct a trusted computin...
peer-reviewedTrusted Computing is a relatively new approach to computer security in which a system s...
The need for security and virtualization capabilities in modern cyber-physical systems is increasing...
Virtualization is the predominant enabling technology of current cloud infrastructures and brings un...
Virtualization has grown increasingly popular, thanks to its benefits of isolation, management, and ...
Virtualization has been used in computer servers for a long time as a means to improve utilization, ...
MasterIn the era of IoT (Internet of Things), embedded devices ranging from mobile devices, e.g. mob...
National audienceAs far as one is concerned by security in virtual embedded systems, one can say tha...
With the advent of the mobile industry, we face new security challenges. ARM architecture is deploye...
The business world is exhibiting a growing dependency on computer systems, their operations and th...
Recent developments in embedded platforms and growing complexity of embedded applications have fathe...
Security threats on consumer devices such as mobile phones are increasing as the software platforms ...
Virtual machine monitors (VMMs), including hypervisors, are a popular platform for implementing vari...
The isolation of security critical components from an untrusted OS allows to both protect applicatio...
Abstract—This paper addresses an essential application of microkernels; its role in virtualization f...
Virtual Machine Monitors (VMMs), also called hypervisors,can be used to construct a trusted computin...
peer-reviewedTrusted Computing is a relatively new approach to computer security in which a system s...
The need for security and virtualization capabilities in modern cyber-physical systems is increasing...
Virtualization is the predominant enabling technology of current cloud infrastructures and brings un...