Auflistung nach Schlagwort "embedded systems"
1 - 6 von 6
Treffer pro Seite
Sortieroptionen
- KonferenzbeitragCase Study: Securing MMU-less Linux Using CHERI(SE 2024 - Companion, 2024) Almatary, Hesham; Mazzinghi, Alfredo; Watson, Robert N. M.MMU-less Linux variant lacks security because it does not have protection or isolation mechanisms. It also does not use MPUs as they do not fit with its software model because of the design drawbacks of MPUs (i. e. coarse-grained protection with fixed number of protected regions). We secure the existing MMU-less Linux version of the RISC-V port using CHERI. CHERI is a hardware-software capability-based system that extends the ISA, toolchain, programming languages, operating systems, and applications in order to provide complete pointer and memory safety. We believe that CHERI could provide significant security guarantees for high-end dynamic MMU-less embedded systems at lower costs, compared to MMUs and MPUs, by: 1) building the entire software stack in pure-capability CHERI C mode which provides complete spatial memory safety at the kernel and user-level, 2) isolating user programs as separate ELFs, each with its own CHERI-based capability table; this provides spatial memory safety similar to what the MMU offers (i. e. user programs cannot access each other’s memory), 3) isolating user programs from the kernel as the kernel has its own capability table from the users and vice versa, and 4) compartmentalising kernel modules using CompartOS’ linkage-based compartmentalisation. This offers a new security front that is not possible using the current MMU-based Linux, where vulnerable/malicious kernel modules (e. g. device drivers) executing in the kernel space would not compromise or take down the entire system. These are the four main contributions of this paper, presenting novel CHERI-based mechanisms to secure MMU-less embedded Linux.
- KonferenzbeitragFlash Tracing: A dynamic analysis technique for embedded systems(INFORMATIK 2024, 2024) Neuschäfer, J.Embedded systems often contain a CPU or SoC which loads code from an external flash memory. By observing the signals between SoC and flash, information about the behavior of code running on the CPU may be gained. A flash tracing tool for the SPI3 bus based on the inexpensive Raspberry Pi Pico microcontroller is presented
- KonferenzbeitragPotentials and challenges for multi-core processors in robotic applications(INFORMATIK 2013 – Informatik angepasst an Mensch, Organisation und Umwelt, 2013) Herkersdorf, Andreas; Paul, Johny; Kumar Pujari, Ravi; Stechele, Walter; Wallentowitz, Stefan; Wild, Thomas; Zaib, AurangMulti-core processors have shown to be superior to single-core with respect to performance and power efficiency. However, multi-core imposes additional challenges on system complexity and application programming. This paper reviews benefits and challenges of multi-core processors in embedded real-time applications like humanoid robotics. Selected approaches towards enabling multi-core processors are shown, covering multiple hardware / software abstraction levels, including isolation of individual applications, differentiated quality-of-service support, thread mpping, and resource-aware programming.
- KonferenzbeitragRisk-Oriented Security Engineering(Automotive - Safety & Security 2017 - Sicherheit und Zuverlässigkeit für automobile Informationstechnik, 2017) Ebert, ChristofVirtually every connected system will be attacked sooner or later. A 100% secure solution is not feasible. Therefore, advanced risk assessment and mitigation is the order of the day. Risk-oriented security engineering for automotive systems helps in both designing for robust systems as well as effective mitigation upon attacks or exploits of vulnerabilities. Security must be integrated early in the design phase of a vehicle to understand the threats and risks to car functions. The security analysis provides requirements and test vectors and adequate measures can be derived for balanced costs and efforts. The results are useful in the partitioning phase when functionality is distributed to ECUs and networks. We will show with concrete examples how risk-oriented cyber security can be successfully achieved in automotive systems. Three levers for automotive security are addressed: (1) Product, i.e., designing for security for components and the system, (2) Process, i.e., implementing cyber security concepts in the development process and (3) Field, i.e., ensuring security concepts are applied during service activities and effective during regular operations.
- TextdokumentSmartOS: An OS Architecture for Sustainable Embedded Systems(Tagungsband des FG-BS Frühjahrstreffens 2022, 2022) Scheipel, Tobias; Batista Ribeiro, Leandro; Sagaster, Tim; Baunach, MarcelThe number of embedded devices is growing, and so are the concerns about dependability and sustainability. However, the life-span of modern devices is commonly very short, due to their lack of long-term maintainability in both hardware and software. This yields an increased amount of e-waste, as the individual devices are commonly very cheap and can therefore easily be replaced in case of (partial) obsolescence. In this work, we show an operating system architecture which is designed to make embedded systems more sustainable and prepared for long-term use. To do so, we implement a general basic architecture alongside extended concepts and special features within the operating system. Our approach is based on hardware/software co-design and the opportunity to update software as well as hardware in a modular way at runtime. Therefore, logic reconfiguration of the host platform, dynamic software composition and integration, as well as formal methods for verification and portability are supported.
- ZeitschriftenartikelTowards Network-Wide Energy Estimation for Adaptive Embedded Systems(Softwaretechnik-Trends: Vol. 33, No. 2, 2013) Heinrich, PatrickPatrick Heinrich