2021 8th International Conference on Future Internet of Things and Cloud (FiCloud) 2021
DOI: 10.1109/ficloud49777.2021.00055
|View full text |Cite
|
Sign up to set email alerts
|

Nested compartmentalisation for constrained devices

Abstract: This paper presents a framework and implementation guidelines to set up nested compartmentalisation in constrained devices. All memory spaces are protected by the Memory Protection Unit (MPU). Current MPU-based systems offer efficient memory protection but are mostly tied to the fixed permission model provided by their operating system, kernel, hypervisor or by code instrumentation. New use cases evolve with the rise of the Internet of Things (IoT) ecosystems where software components could benefit from locall… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…The framework proposed in [10] provides design guidelines for setting up nested compartmentalisation as well as an API to call the services provided by the compartmentalisation entity. In the framework, userland components can create subdomains out of their own memory space.…”
Section: Analogy Between the Nested Compartmentalisation Framework An...mentioning
confidence: 99%
See 3 more Smart Citations
“…The framework proposed in [10] provides design guidelines for setting up nested compartmentalisation as well as an API to call the services provided by the compartmentalisation entity. In the framework, userland components can create subdomains out of their own memory space.…”
Section: Analogy Between the Nested Compartmentalisation Framework An...mentioning
confidence: 99%
“…In Section 4, we present Pip-MPU's requirements that include Pip's requirements plus some requirements specific to constrained devices. In Section 5, we verify which requirements are already satisfied by the use of the nested compartmentalisation framework [10]. We then derive and specialise this framework in the light of Pip's system calls and metadata structures to fulfil the security requirements.…”
Section: Introductionmentioning
confidence: 96%
See 2 more Smart Citations
“…The goal of this work is to engage in the formal verification of Pip-MPU's isolation property, since Pip-MPU's high-level design and conceptual foundations have been introduced in earlier works [2,3]. Indeed, the motivation follows recent increases in cyber-threats on constrained devices (also referred to as low-end devices, of type microcontroller) and especially connected devices.…”
Section: Introductionmentioning
confidence: 99%