A path to scale up proven hardware-based ...
Type de document :
Autre communication scientifique (congrès sans actes - poster - séminaire...): Communication dans un congrès avec actes
Titre :
A path to scale up proven hardware-based security in constrained objects
Auteur(s) :
Dejon, Nicolas [Auteur]
Extra Small Extra Safe [2XS]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Orange Labs [Caen]
Gaber, Chrystel [Auteur]
Orange Labs [Caen]
Grimaud, Gilles [Auteur]
Extra Small Extra Safe [2XS]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Extra Small Extra Safe [2XS]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Orange Labs [Caen]
Gaber, Chrystel [Auteur]
Orange Labs [Caen]
Grimaud, Gilles [Auteur]
Extra Small Extra Safe [2XS]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Titre de la manifestation scientifique :
Conférence francophone d'informatique en Parallélisme, Architecture et Système (COMPAS 2020)
Ville :
Lyon
Pays :
France
Date de début de la manifestation scientifique :
2020-06-30
Mot(s)-clé(s) en anglais :
constrained objects
hardware-enforced isolation
proven kernel
hardware-enforced isolation
proven kernel
Discipline(s) HAL :
Informatique [cs]/Système d'exploitation [cs.OS]
Informatique [cs]/Systèmes embarqués
Informatique [cs]/Systèmes embarqués
Résumé en anglais : [en]
The Internet of Things is revolutionizing the established embedded systems market. However, embedded system designers aren't traditionnally considering security as a top concern and consider maintaining their current tools ...
Lire la suite >The Internet of Things is revolutionizing the established embedded systems market. However, embedded system designers aren't traditionnally considering security as a top concern and consider maintaining their current tools and technologies while opening to connectivity. It is thus expected the embedded systems sector will suffer massively from cyberattacks with the risk to break down traditional IT systems with them. This article demonstrates how this situation is a plausible scenario given the current context and exposes how the existing means to build and secure constrained devices are not sufficient enough to reduce the risks. As a countermeasure, we propose the creation of isolated hardware-enforced trustworthy environments targetting constrained devices in need of strong guarantees by adapting the formally proven Pip protokernel. We explore as well what considerations must be beared in mind to scale up the adoption of the proposed solution.Lire moins >
Lire la suite >The Internet of Things is revolutionizing the established embedded systems market. However, embedded system designers aren't traditionnally considering security as a top concern and consider maintaining their current tools and technologies while opening to connectivity. It is thus expected the embedded systems sector will suffer massively from cyberattacks with the risk to break down traditional IT systems with them. This article demonstrates how this situation is a plausible scenario given the current context and exposes how the existing means to build and secure constrained devices are not sufficient enough to reduce the risks. As a countermeasure, we propose the creation of isolated hardware-enforced trustworthy environments targetting constrained devices in need of strong guarantees by adapting the formally proven Pip protokernel. We explore as well what considerations must be beared in mind to scale up the adoption of the proposed solution.Lire moins >
Langue :
Anglais
Comité de lecture :
Oui
Audience :
Nationale
Vulgarisation :
Non
Collections :
Source :
Fichiers
- https://hal.archives-ouvertes.fr/hal-03318088/document
- Accès libre
- Accéder au document
- https://hal.archives-ouvertes.fr/hal-03318088/document
- Accès libre
- Accéder au document
- https://hal.archives-ouvertes.fr/hal-03318088/file/compas2020.pdf
- Accès libre
- Accéder au document
- document
- Accès libre
- Accéder au document
- compas2020.pdf
- Accès libre
- Accéder au document