Proceedings of the 2014 IEEE Emerging Technology and Factory Automation (ETFA) 2014
DOI: 10.1109/etfa.2014.7005255
|View full text |Cite
|
Sign up to set email alerts
|

Towards a lightweight embedded virtualization architecture exploiting ARM TrustZone

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 20 publications
(10 citation statements)
references
References 7 publications
0
10
0
Order By: Relevance
“…TrustZone-based methodologies. ARM TrustZone was firstly introduced into ARM application processor (Cortex-A) in 2004; recently, ARM released TrustZone-M for the new generation of ARM MCUs (Cortex-M) [59]. This technology is centred around the concept of two hardware-enforced protection domains (secure world and non-secure world).…”
Section: B Prototypes For Mcs I/o Systemsmentioning
confidence: 99%
“…TrustZone-based methodologies. ARM TrustZone was firstly introduced into ARM application processor (Cortex-A) in 2004; recently, ARM released TrustZone-M for the new generation of ARM MCUs (Cortex-M) [59]. This technology is centred around the concept of two hardware-enforced protection domains (secure world and non-secure world).…”
Section: B Prototypes For Mcs I/o Systemsmentioning
confidence: 99%
“…A trusted computing base/secure execution environment is considered to be a major security requirement of a virtualized IoT infrastructure [20,[24][25][26]. Virtual machine isolation at different hardware levels (e.g., processor, memory, and networking) is essential for achieving a trusted computing base [27].…”
Section: Virtualization On Embedded Devicesmentioning
confidence: 99%
“…In an embedded hypervisor architecture as shown in Figure 2, the VCPU is directly assigned to a specific CPU and a secure execution environment is achieved by securely partitioning the memory [17,26].…”
Section: Physical Machinementioning
confidence: 99%
“…To implement temporal and spatial isolation, hypervisors do not always require the availability of all virtualisation extensions. Pinto et al [16] show an interesting approach by exploiting the ARM TrustZone technology to run a realtime operating system in parallel to Linux on a single CPU. Their approach maintains real-time capabilities by using fast interrupts (FIQs) only for real-time critical devices.…”
Section: Related Workmentioning
confidence: 99%