2018 IEEE 36th International Conference on Computer Design (ICCD) 2018
DOI: 10.1109/iccd.2018.00023
|View full text |Cite
|
Sign up to set email alerts
|

CheriRTOS: A Capability Model for Embedded Devices

Abstract: Embedded systems are deployed ubiquitously among various sectors including automotive, medical, robotics and avionics. As these devices become increasingly connected, the attack surface also increases tremendously; new mechanisms must be deployed to defend against more sophisticated attacks while not violating resource constraints. In this paper we present CheriRTOS on CHERI-64, a hardware-software platform atop Capability Hardware Enhanced RISC Instructions (CHERI) for embedded systems. Our system provides ef… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 15 publications
0
7
0
Order By: Relevance
“…One rigid limitation is of course the availability of the MPU, which is an optional unit. Many reasons let developers put aside the MPU even when there is one, should it be because of the hardware constraints, the power it drains or the timeto-market pressure and lack of time to set it up [22]- [24]. However, we argue the protection it provides is sufficient to reach a high level of security when correctly configured and our proposition aims to ease its adoption.…”
Section: Discussion and Limitations Of The Approachmentioning
confidence: 99%
“…One rigid limitation is of course the availability of the MPU, which is an optional unit. Many reasons let developers put aside the MPU even when there is one, should it be because of the hardware constraints, the power it drains or the timeto-market pressure and lack of time to set it up [22]- [24]. However, we argue the protection it provides is sufficient to reach a high level of security when correctly configured and our proposition aims to ease its adoption.…”
Section: Discussion and Limitations Of The Approachmentioning
confidence: 99%
“…Hence, CHERI does not use the nested encapsulation for wrappers that we study in this paper. However, CheriRTOS [14], a CHERI-aware real-time operating system, supports capability-based finegrained isolation for device drivers and would be a candidate implementation platform for our verified wrapper stacks.…”
Section: Related Workmentioning
confidence: 99%
“…Memory isolation techniques for constrained devices are manyfold. Previously discussed MPUbased systems are hardware-rooted but there are hybrid approaches extending the list like TyTAN [13] based on Trustlite, SMART [14], Sancus [15], CheriRTOS [16]. However, they all modify the hardware in a way, for example by extending the CPU instructions or enhancing memory bus access logic.…”
Section: Related Workmentioning
confidence: 99%