Existing high-end embedded systems face frequent security attacks. Software compartmentalization is one technique to limit the attacks' effects to the compromised compartment and not the entire system. Unfortunately, the existing state-of-the-art embedded hardware-software solutions do not work well to enforce software compartmentalization for high-end embedded systems. MPUs are not fine-grained and suffer from significant scalability limitations as they can only protect a small and fixed number of memory regions. On the other hand, MMUs suffer from non-determinism and coarse-grained protection. This paper introduces CompartOS as a lightweight linkage-based compartmentalization model for high-end, complex, mainstream embedded systems. Compa...
This talk is inspired by a number of presentations I followed in previous years at QA&Test: I believ...
The Internet of Things is deploying large numbers of bare-metal systems that have no protection agai...
Abstract: Embedded systems have been almost invisibly pervading our daily lives for several decades....
Embedded systems are deployed ubiquitously among various sectors including automotive, medical, robo...
CHERI extends a conventional RISC Instruction- Set Architecture, compiler, and operating system to s...
This thesis presents the design, implementation, and evaluation of a novel capability operating syst...
CHERI extends a conventional RISC Instruction-Set Architecture, compiler, and operating system to su...
Embedded systems (i.e., single-purpose computers with tightly-coupled software and hardware) are now...
Embedded systems (i.e., single-purpose computers with tightly-coupled software and hardware) are now...
This dissertation explores the use of capability security hardware and software in real-time and lat...
Abstract—CHERI extends a conventional RISC Instruction-Set Architecture, compiler, and operating sys...
Capability Hardware Enhanced RISC Instructions (CHERI) supplement the conventional memory management...
Contemporary CPU architectures conflate virtualization and protection, imposing virtualization-rela...
Nowadays embedded systems in many application areas such as automotive, medical and industrial autom...
This talk is inspired by a number of presentations I followed in previous years at QA&Test: I believ...
This talk is inspired by a number of presentations I followed in previous years at QA&Test: I believ...
The Internet of Things is deploying large numbers of bare-metal systems that have no protection agai...
Abstract: Embedded systems have been almost invisibly pervading our daily lives for several decades....
Embedded systems are deployed ubiquitously among various sectors including automotive, medical, robo...
CHERI extends a conventional RISC Instruction- Set Architecture, compiler, and operating system to s...
This thesis presents the design, implementation, and evaluation of a novel capability operating syst...
CHERI extends a conventional RISC Instruction-Set Architecture, compiler, and operating system to su...
Embedded systems (i.e., single-purpose computers with tightly-coupled software and hardware) are now...
Embedded systems (i.e., single-purpose computers with tightly-coupled software and hardware) are now...
This dissertation explores the use of capability security hardware and software in real-time and lat...
Abstract—CHERI extends a conventional RISC Instruction-Set Architecture, compiler, and operating sys...
Capability Hardware Enhanced RISC Instructions (CHERI) supplement the conventional memory management...
Contemporary CPU architectures conflate virtualization and protection, imposing virtualization-rela...
Nowadays embedded systems in many application areas such as automotive, medical and industrial autom...
This talk is inspired by a number of presentations I followed in previous years at QA&Test: I believ...
This talk is inspired by a number of presentations I followed in previous years at QA&Test: I believ...
The Internet of Things is deploying large numbers of bare-metal systems that have no protection agai...
Abstract: Embedded systems have been almost invisibly pervading our daily lives for several decades....