Hardware/software co-designed security extensions for embedded devices

Maja Malenko*, Marcel Baunach

*Korrespondierende/r Autor/-in für diese Arbeit

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandBegutachtung

Abstract

The rise of the Internet of Things (IoT) has dramatically increased the number of low-cost embedded devices. Being introduced into today’s connected cyber-physical world, these devices now become vulnerable, especially if they offer no protection mechanisms. In this work we present a hardware/software co-designed memory protection approach that provides efficient, cheap, and effective isolation of tasks. The security extensions are implemented into a RISC-V-based MCU and a microkernel-based operating system. Our FPGA prototype shows that the hardware extensions use less than 5.5% of its area in terms of LUTs, and 24.7% in terms of FFs. They impose an extra 28% of context switch time, while providing protection of shared on-chip peripherals and authenticated communication via shared memory.

Originalspracheenglisch
TitelArchitecture of Computing Systems - ARCS 2019 - 32nd International Conference, Proceedings
Redakteure/-innenThilo Pionteck, Jürgen Brehm, Sascha Uhrig, Christian Hochberger, Martin Schoeberl
Herausgeber (Verlag)Springer-Verlag Italia
Seiten3-14
Seitenumfang12
ISBN (Print)9783030186555
DOIs
PublikationsstatusVeröffentlicht - 1 Jan. 2019
Veranstaltung32nd International Conference on Architecture of Computing Systems, ARCS 2019 - Copenhagen, Dänemark
Dauer: 20 Mai 201923 Mai 2019

Publikationsreihe

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Band11479 LNCS
ISSN (Print)0302-9743
ISSN (elektronisch)1611-3349

Konferenz

Konferenz32nd International Conference on Architecture of Computing Systems, ARCS 2019
Land/GebietDänemark
OrtCopenhagen
Zeitraum20/05/1923/05/19

ASJC Scopus subject areas

  • Theoretische Informatik
  • Informatik (insg.)

Fingerprint

Untersuchen Sie die Forschungsthemen von „Hardware/software co-designed security extensions for embedded devices“. Zusammen bilden sie einen einzigartigen Fingerprint.

Dieses zitieren