Providing Security for Embedded Devices Through Virtualization

Slides:



Advertisements
Similar presentations
Unmodified Device Driver Reuse and Improved System Dependability via Virtual Machines J. LeVasseur V. Uhlig J. Stoess S. G¨otz University of Karlsruhe,
Advertisements

User-Mode Linux Ken C.K. Lee
Elements of a Microprocessor system Central processing unit. This performs the arithmetic and logical operations, such as add/subtract, multiply/divide,
New Direction for Software Protection in Embedded Systems Department of EECS University of Michigan Feb 22, 2007 Kang G. Shin.
Microkernels How to build a dependable, modular and secure operating system?
Introduction to Operating Systems CS-2301 B-term Introduction to Operating Systems CS-2301, System Programming for Non-majors (Slides include materials.
Introduction to Virtualization
Virtual Memory Virtual Memory Management in Mach Labels and Event Processes in Asbestos Ingar Arntzen.
CS533 Concepts of Operating Systems Class 14 Virtualization.
© 2004, D. J. Foreman 1 CS350 Operating Systems. © 2004, D. J. Foreman 2 Administrivia  Assignments ■ Homework on most chapters ■ Approximately 8 lab.
OS Spring’03 Introduction Operating Systems Spring 2003.
OPERATING SYSTEMS Introduction
Server Virtualization Gina Myers. Definition Creating virtual machines (VMs) “VMs are software entities that emulate a real machine’s functionality” ◦
Virtualization for Cloud Computing
Dr. José M. Reyes Álamo 1.  Course website  Syllabus posted.
Windows Server 2008 R2 CSIT 320 (Blum) 1. Server Consolidation – Today’s chips have enhanced capabilities compared to those of the past. In particular.
Introduction to Virtual Machines. Administration Presentation and class participation: 40% –Each student will present two and a half times this semester.
Chapter 2 Operating System Overview Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
Chapter 2 Operating System Overview Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
@2011 Mihail L. Sichitiu1 Android Introduction Platform Overview.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 2: System Structures.
A Cloud is a type of parallel and distributed system consisting of a collection of inter- connected and virtualized computers that are dynamically provisioned.
Virtualization. Virtualization  In computing, virtualization is a broad term that refers to the abstraction of computer resources  It is "a technique.
An Introduction to IBM Systems Director
Operating System Support for Virtual Machines Samuel T. King, George W. Dunlap,Peter M.Chen Presented By, Rajesh 1 References [1] Virtual Machines: Supporting.
Eric Keller, Evan Green Princeton University PRESTO /22/08 Virtualizing the Data Plane Through Source Code Merging.
Secure & flexible monitoring of virtual machine University of Mazandran Science & Tecnology By : Esmaill Khanlarpour January.
Introduction to Operating Systems Chapter 1. cs431 -cotter2 Lecture Objectives Understand the relationship between computing hardware, operating system,
Fall 2000M.B. Ibáñez Lecture 01 Introduction What is an Operating System? The Evolution of Operating Systems Course Outline.
Virtualization: Not Just For Servers Hollis Blanchard PowerPC kernel hacker.
1 COMPSCI 110 Operating Systems Who - Introductions How - Policies and Administrative Details Why - Objectives and Expectations What - Our Topic: Operating.
Introduction 1-1 Introduction to Virtual Machines From “Virtual Machines” Smith and Nair Chapter 1.
INTRODUCTION SOFTWARE HARDWARE DIFFERENCE BETWEEN THE S/W AND H/W.
Computers Operating System Essentials. Operating Systems PROGRAM HARDWARE OPERATING SYSTEM.
 Virtual machine systems: simulators for multiple copies of a machine on itself.  Virtual machine (VM): the simulated machine.  Virtual machine monitor.
Operating Systems Structure what is the organizational principle?
Presented By, Bhargavi Konduru.  Nowadays, most electronic appliances have computing capabilities that run on embedded operating system (OS) kernels,
A. Frank - P. Weisberg Operating Systems Structure of Operating Systems.
Protection of Processes Security and privacy of data is challenging currently. Protecting information – Not limited to hardware. – Depends on innovation.
Virtualizing a Multiprocessor Machine on a Network of Computers Easy & efficient utilization of distributed resources Goal Kenji KanedaYoshihiro OyamaAkinori.
Task Mapping and Partition Allocation for Mixed-Criticality Real-Time Systems Domițian Tămaș-Selicean and Paul Pop Technical University of Denmark.
Virtual Machines Mr. Monil Adhikari. Agenda Introduction Classes of Virtual Machines System Virtual Machines Process Virtual Machines.
Background Computer System Architectures Computer System Software.
1 Chapter 2: Operating-System Structures Services Interface provided to users & programmers –System calls (programmer access) –User level access to system.
Chapter 2 Operating System Overview Dave Bremer Otago Polytechnic, N.Z. ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William.
COMPSCI 110 Operating Systems
Modularity Most useful abstractions an OS wants to offer can’t be directly realized by hardware Modularity is one technique the OS uses to provide better.
Operating System Structures
Why VT-d Direct memory access (DMA) is a method that allows an input/output (I/O) device to send or receive data directly to or from the main memory, bypassing.
Lesson Objectives Aims Key Words
Chien-Chung Shen CIS/UD
COMPSCI 110 Operating Systems
OPERATING SYSTEMS DESIGN AND IMPLEMENTATION Third Edition ANDREW S
Chapter 9 – Real Memory Organization and Management
CS490 Windows Internals Quiz 2 09/27/2013.
Design and Implementation of Spacecraft Avionics Software Architecture based on Spacecraft Onboard Interface Services and Packet Utilization Standard Beijing.
Xen: The Art of Virtualization
Chapter 3: Windows7 Part 1.
OS Virtualization.
Chapter 3: Windows7 Part 3.
Virtualization Techniques
Operating Systems Bina Ramamurthy CSE421 11/27/2018 B.Ramamurthy.
Chapter 2: The Linux System Part 1
Outline Chapter 2 (cont) OS Design OS structure
Introduction to Virtual Machines
Computer System Structures
Outline Operating System Organization Operating System Examples
Introduction to Virtual Machines
Chapter 2 Operating System Overview
Chapter 2 Operating System Overview
Presentation transcript:

Providing Security for Embedded Devices Through Virtualization Student: Brahim Sabir Advisor: Dr.A.Ferrante , Ing.F.Regazzoni ALaRI – Master of Advanced Studies in Embedded Systems Design University of Lugano

ALaRI – Master of Advanced Studies in Embedded Systems Design Outline Introduction Embedded Systems today. Evolution of ES software architectures. Fundamentals to create more secure ES. Studied ES architecture. ALaRI – Master of Advanced Studies in Embedded Systems Design University of Lugano 1

ALaRI – Master of Advanced Studies in Embedded Systems Design Introduction Virtualization Multiple operating systems One physical machine. Why Virtualize? Cost savings, Better Resources Utilization, Better security. Goal of the project : providing security for ES through this technique. ALaRI – Master of Advanced Studies in Embedded Systems Design University of Lugano 2

Embedded Systems today Trends : Increasing complexity(HW, SW, more functions), SW have unrestricted access to hardware resources. Increasing connectivity and openness. New applications services, management needs. Device requirements : High performance, constrained resources, reliability safety and security. ALaRI – Master of Advanced Studies in Embedded Systems Design University of Lugano 3

Evolution of ES Software architecture (1) Simple Hardware software partitioning. Software on the device are in equal right access to the hardware. ALaRI – Master of Advanced Studies in Embedded Systems Design University of Lugano 4

Evolution of ES Software architecture(2) Separation of the operating system: all the applications that run on top of OS will separate in one or more processes which were isolated in address space. ALaRI – Master of Advanced Studies in Embedded Systems Design University of Lugano 5

Fundamentals to create more secure ES Splitting complex software. Limit the amount of software running in privileged mode. Least authority Principle. ALaRI – Master of Advanced Studies in Embedded Systems Design University of Lugano 6

Studied ES architecture Requirements : Minimized Kernel. A level of performance. Embedded systems demand small memory footprint. ALaRI – Master of Advanced Studies in Embedded Systems Design University of Lugano 7

ALaRI – Master of Advanced Studies in Embedded Systems Design Future works Implement the explored solution. Propose a solution to provide security for Embedded devices. ALaRI – Master of Advanced Studies in Embedded Systems Design University of Lugano 8