Taming subsystems
- 31 March 2009
- conference paper
- Published by Association for Computing Machinery (ACM)
Abstract
The embedded and mobile computing market with its wide range of innovations is expected to remain growing in the foreseeable future. Recent developments in the embedded computing technology offer more performance thereby facilitating applications of unprecedented utility. Open systems, such as Linux, provide access to a huge software base. Nevertheless, these systems have to coexist with critical device infrastructure that insists on stringent timing and security properties. In this paper, we will present a capability-based software architecture, featuring enforceable security policies. The architecture aims to support current and future requirements of embedded computing systems, such as running versatile third-party applications on general purpose and open operating systems side by side with security sensitive programs.Keywords
This publication has 8 references indexed in Scilit:
- VPFSACM SIGOPS Operating Systems Review, 2008
- FlickerPublished by Association for Computing Machinery (ACM) ,2008
- Virtualization as an enabler for security in mobile devicesPublished by Association for Computing Machinery (ACM) ,2008
- Kernel design for isolation and assurance of physical memoryPublished by Association for Computing Machinery (ACM) ,2008
- Reducing TCB complexity for security-sensitive applicationsACM SIGOPS Operating Systems Review, 2006
- An empirical study of operating systems errorsPublished by Association for Computing Machinery (ACM) ,2001
- EROSPublished by Association for Computing Machinery (ACM) ,1999
- On micro-kernel constructionPublished by Association for Computing Machinery (ACM) ,1995