Embedded virtualization for the design of secure IoT applications

@article{Moratelli2016EmbeddedVF,
  title={Embedded virtualization for the design of secure IoT applications},
  author={Carlos Roberto Moratelli and Sergio Johann Filho and Marcelo Veiga Neves and Fabiano Hessel},
  journal={2016 International Symposium on Rapid System Prototyping (RSP)},
  year={2016},
  pages={1-5}
}
Embedded virtualization has emerged as a valuable way to reduce costs, improve software quality, and decrease design time. Additionally, virtualization can enforce the overall system’s security from several perspectives. One is security due to separation, where the hypervisor ensures that one domain does not compromise the execution of other domains. At the same time, the advances in the development of IoT applications opened discussions about the security flaws that were introduced by IoT… Expand
Secure and Dynamic Memory Management Architecture for Virtualization Technologies in IoT Devices
TLDR
This article proposes the adaptation of ASMI (Architectural Support for Memory Isolation—a general architecture available in the literature for the improvement of the performance and security of virtualization technology) on the popular MIPS (Microprocessor without Interlocked Pipeline Stages) embedded virtualization platform, which could be adopted in embeddedvirtualization architectures for IoT devices. Expand
Lightweight Security Architecture Based on Embedded Virtualization and Trust Mechanisms for IoT Edge Devices
TLDR
This article defines a security architecture that integrates trust mechanisms with embedded virtualization, providing security from hardware to applications, and shows that the proposed architecture can be implemented with a smaller overhead and memory footprint compared to other proposed approaches in the literature. Expand
A lightweight virtualization model to enable edge computing in deeply embedded systems
TLDR
The Hellfire hypervisor is presented, a lightweight virtualization implementation that enables separation and improves security in IoT applications on DES and has a small footprint while keeping a low average virtualization overhead. Expand
ACRN: a big little hypervisor for IoT development
TLDR
ACRN is presented, a flexible, lightweight, scalable, and open source embedded hypervisor for IoT development that presents a consolidated system satisfying real-time and general-purpose needs simultaneously and adopting customer-friendly permissive BSD license provides a practical industry-grade solution with immediate readiness. Expand
Privacy and security of Internet of Things devices
TLDR
Edge-computing devices, with considerable storage and processing power, are strategically placed near sensor networks to process data, increasing the responsiveness of the system, especially for solutions with time constraints, and how they can be integrated to build secure architectures for the IoT are highlighted. Expand
A Flexible FPGA-Assisted Framework for Remote Attestation of Internet Connected Embedded Devices
TLDR
This thesis presents an FPGA-assisted framework for remote attestation, a security service that allows a remote device to prove to a verifying entity that it can be trusted i.e. that it has not been “hacked”. Expand
Design and Implementation of an Interworking IoT Platform and Marketplace in Cloud of Things
An internet of things (IoT) platform is a multi-layer technology that enables automation of connected devices within IoT. IoT platforms serve as a middle-ware solution and act as supporting softwareExpand
μRTZvisor: A secure and safe real-time hypervisor
Virtualization has been deployed as a key enabling technology for coping with the ever growing complexity and heterogeneity of modern computing systems. However, on its own, classical virtualizationExpand
Timing Covert Channel Analysis of the VxWorks MILS Embedded Hypervisor under the Common Criteria Security Certification
TLDR
Experimental analysis shows that it is indeed possible to establish a timing covert channel in embedded hypervisors, and that the approach is useful for system designers for assessing that their configuration is robust against this kind of information leakage. Expand
Performance analysis of virtualized embedded computing systems
  • D. Mathew, B. A. Jose
  • Computer Science
  • 2017 7th International Symposium on Embedded Computing and System Design (ISED)
  • 2017
TLDR
The goal is to understand the performance characteristics of various virtualization types for embedded systems, and observations regarding hypervisor performance are discussed to form conclusions on why some of the virtualization features are important. Expand
...
1
2
...

References

SHOWING 1-10 OF 24 REFERENCES
Exploring Container Virtualization in IoT Clouds
TLDR
This paper explores the container-based virtualization on smart objects in the perspective of a IoT Cloud scenarios analyzing its advantages and performances. Expand
Emerging Security Threats and Countermeasures in IoT
TLDR
This paper enumerate the IoT communication scenarios and investigate the threats to the large-scale, unreliable, pervasive computing environment and various authentication schemes will be evaluated to ensure the confidentiality and integrity of the exchanged data. Expand
Security of IoT systems: Design challenges and opportunities
TLDR
A brief survey of IoT challenges and opportunities with an emphasis on security issues and several case studies that advocate the use of stable PUFs and digital PPUFs for several IoT security protocols are presented. Expand
Internet of things (IoT) security: Current status, challenges and prospective measures
TLDR
An overview of security principles, technological and security challenges, proposed countermeasures, and the future directions for securing the IoT is presented. Expand
A survey on IoT architectures, protocols, applications, security, privacy, real-world implementation and future trends
TLDR
The evolution and how important of IoT in daily life, the generic architecture, its most widely used protocols, numerous possible applications but also concern over security and privacy issues in IoT, real-world implementation of IoT system by using Arduino and its future trends are described. Expand
Security and privacy threats in IoT architectures
TLDR
The strong view is that the IoT will be an important part of the global huge ICT infrastructure ("future Internet") humanity will be strongly relying on in the future with relatively few data centers connected to trillions of sensors and other "things" over gateways, various access networks and a global network connecting them. Expand
A hypervisor approach with real-time support to the MIPS M5150 processor
TLDR
This work presents a hypervisor implementation approach with real-time support to the MIPS M5150 processor which supports hardware-assisted virtualization, and shows that the implementation allows full-virtualization and communication among virtual machines with minimal overhead while providing strong spatial and temporal isolation between virtual machines. Expand
Hardware-assisted interrupt delivery optimization for virtualized embedded platforms
TLDR
An interrupt policy for an embedded hypervisor using hardware-assisted virtualization is proposed and experimental results show that the interrupt delivery jitter on virtualized systems is close to non-virtualized when the proposed approach is used. Expand
MultiPARTES: Multicore Virtualization for Mixed-Criticality Systems
TLDR
The MultiPARTES FP7 project aims at supporting mixed-criticality integration for embedded systems based on virtualization techniques for heterogeneous multicore processors by incorporating mechanisms that establish multiple partitions with strict temporal and spatial separation between the individual partitions. Expand
A Hypervisor for MIPS-Based Architecture Processors - A Case Study in Loongson Processors
  • R. Zhou, Zhu Ai, +4 authors Kuan-Ching Li
  • Computer Science
  • 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing
  • 2013
TLDR
The M-Hyper visor discussed in this paper is a real-time hyper visor designed for MIPS architecture and implemented in Loongson2F processor, based on the management program of para-virtualization whilst multiple partitions are scheduled to execute according to their priorities. Expand
...
1
2
3
...