A path to scale up proven hardware-based ...
Document type :
Autre communication scientifique (congrès sans actes - poster - séminaire...): Communication dans un congrès avec actes
Title :
A path to scale up proven hardware-based security in constrained objects
Author(s) :
Dejon, Nicolas [Auteur]
Extra Small Extra Safe [2XS]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Orange Labs [Caen]
Gaber, Chrystel [Auteur]
Orange Labs [Caen]
Grimaud, Gilles [Auteur]
Extra Small Extra Safe [2XS]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Extra Small Extra Safe [2XS]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Orange Labs [Caen]
Gaber, Chrystel [Auteur]
Orange Labs [Caen]
Grimaud, Gilles [Auteur]
Extra Small Extra Safe [2XS]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Conference title :
Conférence francophone d'informatique en Parallélisme, Architecture et Système (COMPAS 2020)
City :
Lyon
Country :
France
Start date of the conference :
2020-06-30
English keyword(s) :
constrained objects
hardware-enforced isolation
proven kernel
hardware-enforced isolation
proven kernel
HAL domain(s) :
Informatique [cs]/Système d'exploitation [cs.OS]
Informatique [cs]/Systèmes embarqués
Informatique [cs]/Systèmes embarqués
English abstract : [en]
The Internet of Things is revolutionizing the established embedded systems market. However, embedded system designers aren't traditionnally considering security as a top concern and consider maintaining their current tools ...
Show more >The Internet of Things is revolutionizing the established embedded systems market. However, embedded system designers aren't traditionnally considering security as a top concern and consider maintaining their current tools and technologies while opening to connectivity. It is thus expected the embedded systems sector will suffer massively from cyberattacks with the risk to break down traditional IT systems with them. This article demonstrates how this situation is a plausible scenario given the current context and exposes how the existing means to build and secure constrained devices are not sufficient enough to reduce the risks. As a countermeasure, we propose the creation of isolated hardware-enforced trustworthy environments targetting constrained devices in need of strong guarantees by adapting the formally proven Pip protokernel. We explore as well what considerations must be beared in mind to scale up the adoption of the proposed solution.Show less >
Show more >The Internet of Things is revolutionizing the established embedded systems market. However, embedded system designers aren't traditionnally considering security as a top concern and consider maintaining their current tools and technologies while opening to connectivity. It is thus expected the embedded systems sector will suffer massively from cyberattacks with the risk to break down traditional IT systems with them. This article demonstrates how this situation is a plausible scenario given the current context and exposes how the existing means to build and secure constrained devices are not sufficient enough to reduce the risks. As a countermeasure, we propose the creation of isolated hardware-enforced trustworthy environments targetting constrained devices in need of strong guarantees by adapting the formally proven Pip protokernel. We explore as well what considerations must be beared in mind to scale up the adoption of the proposed solution.Show less >
Language :
Anglais
Peer reviewed article :
Oui
Audience :
Nationale
Popular science :
Non
Collections :
Source :
Files
- https://hal.archives-ouvertes.fr/hal-03318088/document
- Open access
- Access the document
- https://hal.archives-ouvertes.fr/hal-03318088/document
- Open access
- Access the document
- https://hal.archives-ouvertes.fr/hal-03318088/file/compas2020.pdf
- Open access
- Access the document
- document
- Open access
- Access the document
- compas2020.pdf
- Open access
- Access the document