Perspectives on security kernels for IoT
Document type :
Autre communication scientifique (congrès sans actes - poster - séminaire...): Communication dans un congrès avec actes
Title :
Perspectives on security kernels for IoT
Author(s) :
Dejon, Nicolas [Auteur]
Extra Small Extra Safe [2XS]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Orange Labs [Caen]
Gaber, Chrystel [Auteur]
Orange Labs [Caen]
Grimaud, Gilles [Auteur]
Extra Small Extra Safe [2XS]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Extra Small Extra Safe [2XS]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Orange Labs [Caen]
Gaber, Chrystel [Auteur]
Orange Labs [Caen]
Grimaud, Gilles [Auteur]

Extra Small Extra Safe [2XS]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Conference title :
RESSI (Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information)
City :
Online
Country :
France
Start date of the conference :
2020-12-16
English keyword(s) :
kernel
IoT
constrained objects
memory isolation
formally proven kernel
IoT
constrained objects
memory isolation
formally proven kernel
HAL domain(s) :
Informatique [cs]/Système d'exploitation [cs.OS]
Informatique [cs]/Systèmes embarqués
Informatique [cs]/Systèmes embarqués
English abstract : [en]
IoT market's growth surge encouraged developers to focus on fast delivery rather than security resulting in several major attacks. Efforts to provide secure-by-design applications or IoT devices rely on trusting physical ...
Show more >IoT market's growth surge encouraged developers to focus on fast delivery rather than security resulting in several major attacks. Efforts to provide secure-by-design applications or IoT devices rely on trusting physical secure elements or on the lower software layers. Thus, the entire system roots its overall security in the kernel given it is the first software layer above the hardware. However, constrained objects often struggle to combine functionality and security due to inherent low resources and few mechanisms address this problem. In this article, we explore existing approaches and highlight the need for a minimal and formally proven root of trust for constrained objects while presenting the challenges this implies.Show less >
Show more >IoT market's growth surge encouraged developers to focus on fast delivery rather than security resulting in several major attacks. Efforts to provide secure-by-design applications or IoT devices rely on trusting physical secure elements or on the lower software layers. Thus, the entire system roots its overall security in the kernel given it is the first software layer above the hardware. However, constrained objects often struggle to combine functionality and security due to inherent low resources and few mechanisms address this problem. In this article, we explore existing approaches and highlight the need for a minimal and formally proven root of trust for constrained objects while presenting the challenges this implies.Show less >
Language :
Anglais
Peer reviewed article :
Oui
Audience :
Nationale
Popular science :
Non
Collections :
Source :
Files
- https://hal.archives-ouvertes.fr/hal-03102252/document
- Open access
- Access the document
- https://hal.archives-ouvertes.fr/hal-03102252/document
- Open access
- Access the document
- https://hal.archives-ouvertes.fr/hal-03102252/document
- Open access
- Access the document
- RESSI_20.pdf
- Open access
- Access the document
- document
- Open access
- Access the document