2021
DOI: 10.48550/arxiv.2106.12553
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Femto-Containers: DevOps on Microcontrollers with Lightweight Virtualization & Isolation for IoT Software Modules

Abstract: Development, deployment and maintenance of networked software has been revolutionized by DevOps practices, which boost system software quality and agile evolution. However, as the Internet of Things (IoT) connects low-power, microcontroller-based devices which take part in larger distributed cyberphysical systems, such low-power IoT devices are not easy to integrate in DevOps workflows. In this paper, we contribute to mitigate this problem by designing Femto-Containers, a new hardware-independent mechanism whi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…Therefore, the SUIT workflow allows an Information System Management (ISM) service to upload a firmware image containing security vulnerabilities or malicious behaviors. Furthermore, as demonstrated by some recent work, the SUIT workflow is flexible in that it allows not only pre-quantum, but also post-quantum security [22], and does not only cater for full IoT firmware updates, but also for securing modular software updates on low-power IoT devices [23]. Last but not least, SUIT allows the ISM to transfer its authority to another entity, e.g., a third-party developer, that can deliver to the ISM some components of a software update (e.g., the executable of the application to be updated) or trigger the update process directly.…”
Section: Discussionmentioning
confidence: 99%
“…Therefore, the SUIT workflow allows an Information System Management (ISM) service to upload a firmware image containing security vulnerabilities or malicious behaviors. Furthermore, as demonstrated by some recent work, the SUIT workflow is flexible in that it allows not only pre-quantum, but also post-quantum security [22], and does not only cater for full IoT firmware updates, but also for securing modular software updates on low-power IoT devices [23]. Last but not least, SUIT allows the ISM to transfer its authority to another entity, e.g., a third-party developer, that can deliver to the ISM some components of a software update (e.g., the executable of the application to be updated) or trigger the update process directly.…”
Section: Discussionmentioning
confidence: 99%
“…We generalized the SUIT state machine to add support for (i) Heterogeneous update delivery mechanisms with configurable {message model, network stack, network interface} bundle, or FileSystem read/write functions, (ii) Heterogeneous storage destination with configurable internal/external memory either Volatile (e.g. RAM for mission files, or for tiny runtime execution containers such as Fem-toContainers [24]) or non-volatile (e.g. FileSystem or internal Flash) and (iii) Heterogeneous update data URI with either a local file (e.g.…”
Section: Cubedate Implementationmentioning
confidence: 99%
“…Hardware vendors typically provide a HdS implementation in the C programming language only. However, newer compiled languages and dynamic runtime environments, such as C++ [34], Rust [59], Python [38], and IoT-focused Femto-Containers [80], bring new programming paradigms and features to resource-limited embedded systems, but they require a custom HdS stack [15,30].…”
Section: Introductionmentioning
confidence: 99%