2016
DOI: 10.1016/j.sysarc.2016.01.006
|View full text |Cite
|
Sign up to set email alerts
|

Memory protection in embedded systems

Abstract: With reference to an embedded system featuring no support for memory management, we present a model of a protection system based on passwords. At the hardware level, our model takes advantage of a memory protection unit (MPU) interposed between the processor and the complex of the main memory and the input-output devices. The MPU supports both concepts of a protection context and a protection domain. A protection context is a set of access rights for the memory pages; a protection domain is a set of one or mor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
3
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 32 publications
0
3
0
Order By: Relevance
“…It is then possible to employ MPU-like structures to protect the resources from specific masters. The approach presented in [9] targets system-on-chip (SoC) platforms with a single processor whose tasks need to be isolated from certain memory regions and I/O controllers. Similar approaches that are targeted at multi-master platforms are described in [10] and [11].…”
Section: Related Workmentioning
confidence: 99%
“…It is then possible to employ MPU-like structures to protect the resources from specific masters. The approach presented in [9] targets system-on-chip (SoC) platforms with a single processor whose tasks need to be isolated from certain memory regions and I/O controllers. Similar approaches that are targeted at multi-master platforms are described in [10] and [11].…”
Section: Related Workmentioning
confidence: 99%
“…In a different approach, all the processes share a single address space [5], [6], [7], [8]. In this approach, two or more processes aimed at accessing the same given information item simply use the virtual address of this item.…”
Section: Introductionmentioning
confidence: 99%
“…This situation is unlikely to change in the near future. Rather than supporting the addition of new sophisticated hardware functionalities, advances in integration technology are likely to be used to reduce the system size and cost [7], [8], [9].…”
Section: Introductionmentioning
confidence: 99%