2018 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS) 2018
DOI: 10.1109/rtas.2018.00012
|View full text |Cite
|
Sign up to set email alerts
|

Predictable Virtualization on Memory Protection Unit-Based Microcontrollers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 21 publications
0
7
0
Order By: Relevance
“…Classic approaches to provide isolation and implement reliable systems on low-end embedded devices have been evolving from constructive (language/compiler-based) memory protection [58]- [62] and hardware-enforced RTOS mechanisms [21], [63], [64], to lightweight virtualization infrastructures [4], [5], [65], [66]. Tock [59] leverages limited hardware protection mechanisms as well as the type-safety features of the Rust programming language to provide a reliable multiprogramming environment for MCUs.…”
Section: Reliable Systems For Mcu-powered Iot Devicesmentioning
confidence: 99%
See 1 more Smart Citation
“…Classic approaches to provide isolation and implement reliable systems on low-end embedded devices have been evolving from constructive (language/compiler-based) memory protection [58]- [62] and hardware-enforced RTOS mechanisms [21], [63], [64], to lightweight virtualization infrastructures [4], [5], [65], [66]. Tock [59] leverages limited hardware protection mechanisms as well as the type-safety features of the Rust programming language to provide a reliable multiprogramming environment for MCUs.…”
Section: Reliable Systems For Mcu-powered Iot Devicesmentioning
confidence: 99%
“…Complex functional requirements are met by integrating multiple codebases, drivers, and libraries from different 3rd party entities with distinct assurance levels. Such problems are exacerbated in devices composed by microcontrollers (MCUs) that typically lack reliable mechanisms to enforce the separation among these multi-source and mixed-criticality components [4], [5]. Therefore, with the IoT ecosystem evolving at a breathtaking pace, the need for reliable security architectures is rising; however, due to the heterogeneity and limitation of computational resources on MCUs, creating and adopting these architectures still challenges most IoT system developers [6]- [9].…”
Section: Introductionmentioning
confidence: 99%
“…Reliable systems for the IoT. Classic approaches to provide isolation and implement reliable systems on resourceconstrained devices have been evolving from constructive (language/compiler-based) memory protection [52]- [56] and hardware-enforced RTOS mechanisms [21], [57], [58], to lightweight virtualization infrastructures [5], [6], [59], [60]. Tock [53] leverages limited hardware protection mechanisms as well as the type-safety features of the Rust programming language to provide a reliable multiprogramming environment for MCUs.…”
Section: Related Workmentioning
confidence: 99%
“…F. Paci et al [60] proposed a lightweight I/O virtualization approach using the MPU support on FreeRTOS to create a task which mediates all I/O accesses. F. Bruns et al [59] and R. Pan et al [5] have proposed virtualization infrastructures leveraging the MPU. Pinto et al [6] have also proposed a TrustZone-based virtualization solution for Cortex-M MCUs.…”
Section: Related Workmentioning
confidence: 99%
“…A crucial guarantee that the kernel ensures (independent of any component's logic) is that memory that has been typed as kernel (i.e., that backs kernel data-structures) cannot also be typed as user memory (thus accessible to components) -this has the effect of ensuring the consistency of kernel data-structures. Pan et al [17] introduced the use of the space-efficient Path-Compressed Radix Trie (PCTrie) datastructure to program MPU regions. MxU uses PCTries as the uniform data-structure to describe both MMU and MPU systems (page tables are a specific configuration of PCTries).…”
Section: Mxu-enabled Composite Kernelmentioning
confidence: 99%