Tyus Carver, Josh Clark, Dock O'neal, Kyle Sekellick, Jeremy Smith,

Slides:



Advertisements
Similar presentations
System Area Network Abhiram Shandilya 12/06/01. Overview Introduction to System Area Networks SAN Design and Examples SAN Applications.
Advertisements

Embedded System Lab. What is an embedded systems? An embedded system is a computer system designed for specific control functions within a larger system,
Introduction CSCI 444/544 Operating Systems Fall 2008.
Basic Input Output System
Threads, SMP, and Microkernels Chapter 4. Process Resource ownership - process is allocated a virtual address space to hold the process image Scheduling/execution-
Ravi Vasdev SEMINAR ON. WHAT ARE EMBEDDED SYSTEMS  THESE ARE SINGLE BOARD COMPUTERS  THESE ARE ELECTRONIC DEVICES THAT INCORPORATE MICROPROCESSORS.
Chapter 8 Hardware Conventional Computer Hardware Architecture.
Computer Systems/Operating Systems - Class 8
Introduction to Operating Systems CS-2301 B-term Introduction to Operating Systems CS-2301, System Programming for Non-majors (Slides include materials.
Intro to computers Hardware Operating System, Communication Computers PowerHardware Software OS Application COMMUNICATION.
1 Platform-Based Design A paper by Alberto Sangiovanni-Vincentelli EE 249, 11/5/2002 Presenter: Mel Tsai.
Introduction Operating Systems’ Concepts and Structure Lecture 1 ~ Spring, 2008 ~ Spring, 2008TUCN. Operating Systems. Lecture 1.
Copyright Arshi Khan1 System Programming Instructor Arshi Khan.
This Thursday, Oct. 25 th 1-1:50pm: Exam in DUANE G140 Covers lectures and labs (except today’s lecture on microcontrollers) You may bring handwritten.
Performance Evaluation of Real-Time Operating Systems
Chapter 10 Topics in Embedded Systems. 2 Chapter 10 Objectives Understand the ways in which embedded systems differ from general purpose systems. Be able.
Programming mobile devices Part II Programming Symbian devices with Symbian C++
Secure Embedded Processing through Hardware-assisted Run-time Monitoring Zubin Kumar.
ICMetrics Experimental Platform Jenya Kovalchuk University of Essex 27 January 2012 Ecole Centrale of Lille 1 Part-financed by the European Regional Development.
SEC835 Database and Web application security Information Security Architecture.
Computer Organization
Embedded System Design
Memory Hierarchy.
Computer System Architectures Computer System Software
Operating System A program that controls the execution of application programs An interface between applications and hardware 1.
WEB ENGINEERING LECTURE 4 BY Kiramat Rahman. outline  In this Lecture you will learn about:  Term “Software” and its relationship with “Hardware” 
Introduction and Overview Questions answered in this lecture: What is an operating system? How have operating systems evolved? Why study operating systems?
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Parallel Programming Models Jihad El-Sana These slides are based on the book: Introduction to Parallel Computing, Blaise Barney, Lawrence Livermore National.
Security as a New Dimension in Embedded System Design Presented by : Vivek Srikantan Authors: Paul Kocher Ruby Lee Gary McGraw Anand Raghunathan Srivaths.
1 3-General Purpose Processors: Altera Nios II 2 Altera Nios II processor A 32-bit soft core processor from Altera Comes in three cores: Fast, Standard,
Eric Keller, Evan Green Princeton University PRESTO /22/08 Virtualizing the Data Plane Through Source Code Merging.
Three fundamental concepts in computer security: Reference Monitors: An access control concept that refers to an abstract machine that mediates all accesses.
SCSC 311 Information Systems: hardware and software.
Computers organization & Assembly Language Chapter 0 INTRODUCTION TO COMPUTING Basic Concepts.
PRESENTED BY :BIREN KUMAR SAMAL ADMISSION NO:22I&E/2000.
Processes and OS basics. RHS – SOC 2 OS Basics An Operating System (OS) is essentially an abstraction of a computer As a user or programmer, I do not.
INTRODUCTION SOFTWARE HARDWARE DIFFERENCE BETWEEN THE S/W AND H/W.
Lecture 3 Process Concepts. What is a Process? A process is the dynamic execution context of an executing program. Several processes may run concurrently,
Operating Systems. Definition An operating system is a collection of programs that manage the resources of the system, and provides a interface between.
TMS320 DSP Algorithm Standard: Overview & Rationalization.
Ihr Logo Operating Systems Internals & Design Principles Fifth Edition William Stallings Chapter 2 (Part II) Operating System Overview.
2006 Chapter-1 L1: "Embedded Systems - Architecture, Programming and Design", Raj Kamal, Publs.: McGraw-Hill, Inc. 1 Introduction to Embedded Systems.
25 April 2000 SEESCOASEESCOA STWW - Programma Evaluation of on-chip debugging techniques Deliverable D5.1 Michiel Ronsse.
1 Threads, SMP, and Microkernels Chapter Multithreading Operating system supports multiple threads of execution within a single process MS-DOS.
R ECONFIGURABLE SECURITY SUPPORT FOR EMBEDDED SYSTEMS 1 AKSHATA VARDHARAJ.
Graciela Saunders.  Introduction / Review  Challenges to Embedded Security  Approaches to Embedded Security  Security Analysis & Attack Taxonomy 
Computer Based Systems Stage 2 Information Technology Studies Computer & Communication Systems.
Lecture 1: Network Operating Systems (NOS) An Introduction.
Chapter 8 System Management Semester 2. Objectives  Evaluating an operating system  Cooperation among components  The role of memory, processor,
Real-Time Operating System Design
6.0 INTRODUCTION TO REAL-TIME OPERATING SYSTEMS (RTOS) 6.0 Introduction A more complex software architecture is needed to handle multiple tasks, coordination,
System Architecture Directions for Networked Sensors.
Operating Systems Unit 2: – Process Context switch Interrupt Interprocess communication – Thread Thread models Operating Systems.
Background Computer System Architectures Computer System Software.
Embedded Real-Time Systems Processing interrupts Lecturer Department University.
Embedded System Design and Development Introduction to Embedded System.
Week-14 (Lecture-1) Malicious software and antivirus: 1. Malware A user can be tricked or forced into downloading malware comes in many forms, Ex. viruses,
1 Lesson 1 Computers and Computer Systems Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
1 Chapter 2: Operating-System Structures Services Interface provided to users & programmers –System calls (programmer access) –User level access to system.
Embedded Systems. What is Embedded Systems?  Embedded reflects the facts that they are an integral.
Programmable Logic Devices
6.0 INTRODUCTION TO REAL-TIME OPERATING SYSTEMS (RTOS/RTK)
THE PROCESS OF EMBEDDED SYSTEM DEVELOPMENT
Chapter 3: Windows7 Part 1.
Dynamically Reconfigurable Architectures: An Overview
Language Processors Application Domain – ideas concerning the behavior of a software. Execution Domain – Ideas implemented in Computer System. Semantic.
Embedded System Development Lecture 1 1/10/2007
Presentation transcript:

Tyus Carver, Josh Clark, Dock O'neal, Kyle Sekellick, Jeremy Smith,

Overview of Embedded Systems  System A way of working, organizing or doing one or many tasks according to a fixed plan, program, or set of rules an arrangement in which all its units assemble and work together according to the plan or program  Embedded System: a system that has computer–hardware with software embedded, or fixed, in it

Overview continued..  Main components of Embedded Systems Hardware Main application software Real-time operating system supervising the application software  Classification of Embedded Systems Small Scale, Medium Scale, and Sophisticated Embedded Systems

Embedded History  1958 Jack Kiby invents the first integrated circuit at Texas Instruments  1959 planar transistor makes commercial production of integrated circuit's possible  1960's brings revolutions in integrated circuits  Developments in integrated circuit technology leads directly into microprocessors

History continued  Intel comes up with idea of reprogrammable microprocessor in  In 1971 the Intel 4004 chip is released First microprocessor Requires additional components  1974 Texas Instruments releases the TMS 1000 First chip to be targeted at embedded systems

Embedded Systems Hardware  Three General Categories Standardized processor Configurable rocessor Full-Custom processor

Standardized Processor  Microcontroller Derivatives of yesterday’s leading edge general purpose processors Programmable Slow clock-speed, little memory, and unchangeable to consumer  Systems on a Chip Much more complex Supporting circuits Off-The-Shelf or Custom

ConfigurableProcessor  PLD  PAL  PLAs

Full-Custom Processor  Application-specific integrated circuit (ASIC) Behavioral perspective (purpose) Structural perspective (which components provide desired behavior) Physical Perspective (how to place on the chip)

Embedded System Software  Embedded System Memory vs. general purpose computer memory Two types of memory distinction ○ rarely employ virtual memory ○ Variable and diverse from memory architectures  Can contain RAM, ROM, and flash memory  ISRs (interrupt service routine) are used in invoke various signal on the pins of the processor

Embedded System Software Cont.  Memory space is distinguished between program memory, writeable data memory, and read-only memory. Read-only contains constants and literals used by the embedded program, embedded systems usually only run one program so ROM can be used, this protects from accidental overwrites. The designer determines the placement of the program code Stack and heap are often implemented in static RAM to eliminate DRAM refresh cycles. Heap may or may not be used Dynamic memory may be avoided because it memory cleanup incurs overhead that can cause unpredictable access delays Memory leaks are very bad as most embedded systems run for months or years without every rebooting. A tiny leak can eventually cause a catastrophic system meltdown.

Embedded System Software Cont.  Responsiveness Differs in access to hardware and events are clearly defined ○ Hard and soft real time systems  If you’re late you’re wrong Evaluation of responsiveness ○ Context switch time or interrupt latency

Embedded System Software Cont.  Memory Footprint Uses small and efficient kernels ○ Come with a scheduler, interprocess communications manager, etc.  Use standard IEEE POSIX A standardized UNIX specification that now includes real-time extensions Dozens of operating systems are available, QNX being the most popular

Embedded System Software Cont.  Development Requirements must be spelled out in detail ○ Use of formal languages  Schedules are carefully planned and monitored  Hard to break into chunks for individual teams.

Embedded System Software Cont.  Major Problems involved Global variables ○ Have both positive and negative draw backs Unstructured code ○ Is spaghetti code the way to go? Events ○ Impossible to determine order of events Debugging ○ BDM, JTAG, NEXUS, ICE

Security of Embedded Systems  Embedded systems are vulnerable to several types of attacks and attackers: Class I: Low threats that target existing weaknesses Class II: Insiders with training and more resources Class III: Specialists with little to no limit on resources

Security of Embedded Systems Cont.  These systems need to be secure multiple ways: Private Users (User identification) Secure Network Access (A verified device) Secure Communications (Authenticating peers) Secure Storage Content Security (Content restrictions) Availability (Minimizing downtime)

Security of Embedded Systems Cont.  Developers also have some challenges faced when trying to make their systems secure: Processing Gap: A device’s processing power Battery Gap: A device’s battery capacity Flexibility: A device’s ability to house several types of security Tamper Resistance: A device’s durability Assurance Gap: A device’s uptime Cost: A device’s manufacturing and retail cost  Some Solutions: Symmetric Ciphers (Secure Keys) Asymmetric Ciphers (Secure and Public Keys) Hashing Algorithms (Encrypted Messages)

References  Grand, Joe. " usa-04/bh-us-04- grand/grand_embedded_security_US04.pdf." Black Hat. Web. 22 Apr  "Historymicro." Historymicro. Web. 22 Apr  Null, Linda, and Julia Lobur. "Embedded Systems." The Essentials of Computer Organization and Architecture. Sudbury, Mass.: Jones and Bartlett, Print.  RAVI, SRIVATHS, and ANAND RAGHUNATHAN. "Security in Embedded Systems: Design Challenges." Georgia Tech. Web. 22 Apr