• English
    • français
  • Help
  •  | 
  • Contact
  •  | 
  • About
  •  | 
  • Login
  • HAL portal
  •  | 
  • Pages Pro
  • EN
  •  / 
  • FR
View Item 
  •   LillOA Home
  • Liste des unités
  • Centre de Recherche en Informatique, Signal et Automatique de Lille (CRIStAL) - UMR 9189
  • View Item
  •   LillOA Home
  • Liste des unités
  • Centre de Recherche en Informatique, Signal et Automatique de Lille (CRIStAL) - UMR 9189
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

Perspectives on security kernels for IoT
  • BibTeX
  • CSV
  • Excel
  • RIS

Document type :
Autre communication scientifique (congrès sans actes - poster - séminaire...): Communication dans un congrès avec actes
Title :
Perspectives on security kernels for IoT
Author(s) :
Dejon, Nicolas [Auteur]
Extra Small Extra Safe [2XS]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Orange Labs [Caen]
Gaber, Chrystel [Auteur]
Orange Labs [Caen]
Grimaud, Gilles [Auteur] refId
Extra Small Extra Safe [2XS]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Conference title :
RESSI (Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information)
City :
Online
Country :
France
Start date of the conference :
2020-12-16
English keyword(s) :
kernel
IoT
constrained objects
memory isolation
formally proven kernel
HAL domain(s) :
Informatique [cs]/Système d'exploitation [cs.OS]
Informatique [cs]/Systèmes embarqués
English abstract : [en]
IoT market's growth surge encouraged developers to focus on fast delivery rather than security resulting in several major attacks. Efforts to provide secure-by-design applications or IoT devices rely on trusting physical ...
Show more >
IoT market's growth surge encouraged developers to focus on fast delivery rather than security resulting in several major attacks. Efforts to provide secure-by-design applications or IoT devices rely on trusting physical secure elements or on the lower software layers. Thus, the entire system roots its overall security in the kernel given it is the first software layer above the hardware. However, constrained objects often struggle to combine functionality and security due to inherent low resources and few mechanisms address this problem. In this article, we explore existing approaches and highlight the need for a minimal and formally proven root of trust for constrained objects while presenting the challenges this implies.Show less >
Language :
Anglais
Peer reviewed article :
Oui
Audience :
Nationale
Popular science :
Non
Collections :
  • Centre de Recherche en Informatique, Signal et Automatique de Lille (CRIStAL) - UMR 9189
Source :
Harvested from HAL
Files
Thumbnail
  • https://hal.archives-ouvertes.fr/hal-03102252/document
  • Open access
  • Access the document
Thumbnail
  • https://hal.archives-ouvertes.fr/hal-03102252/document
  • Open access
  • Access the document
Thumbnail
  • https://hal.archives-ouvertes.fr/hal-03102252/document
  • Open access
  • Access the document
Université de Lille

Mentions légales
Université de Lille © 2017