2019 IEEE Real-Time Systems Symposium (RTSS) 2019
DOI: 10.1109/rtss46320.2019.00037
|View full text |Cite
|
Sign up to set email alerts
|

MCS-IOV: Real-Time I/O Virtualization for Mixed-Criticality Systems

Abstract: In mixed-criticality systems, timely handling of I/O is a key for the system being successfully implemented and functioning appropriately. The criticality levels of functions and sometimes the whole system are often dependent on the state of the I/O. An I/O system for a MCS must provide simultaneously isolation/separation, performance/efficiency and timingpredictability, as well as being able to manage I/O resource in an adaptive manner to facilitate efficient yet safe resource sharing among components of diff… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 17 publications
(3 citation statements)
references
References 35 publications
0
3
0
Order By: Relevance
“…Similarly, Arm TrustZone offers hardware-based access control by enabling a processor to run in two isolated execution environments, i.e., the secure and non-secure world. TrustZone is widely used in mobile devices and ARM-based servers [25], hosting secure kernels such as Trustonic 3 , Qualcomm's QSEE 4 , and Linaro's OP-TEE 5 , ensuring the protection of securitycritical data, and facilitating the deployment of various TAs with distinct functionalities.…”
Section: ) Trusted Execution Environments (Tees)mentioning
confidence: 99%
See 1 more Smart Citation
“…Similarly, Arm TrustZone offers hardware-based access control by enabling a processor to run in two isolated execution environments, i.e., the secure and non-secure world. TrustZone is widely used in mobile devices and ARM-based servers [25], hosting secure kernels such as Trustonic 3 , Qualcomm's QSEE 4 , and Linaro's OP-TEE 5 , ensuring the protection of securitycritical data, and facilitating the deployment of various TAs with distinct functionalities.…”
Section: ) Trusted Execution Environments (Tees)mentioning
confidence: 99%
“…C yber-physical systems have evolved significantly in the past few decades [1], transitioning from single-purpose devices with limited communications and simple interfaces to power-and compute-hungry general-purpose systems with multiple functionalities and complex interactions [2]. To meet the demands for reduced size, weight, power, and cost (SWaP-C), there has been a paradigm shift towards the deployment of mixed-criticality systems (MCS), which integrate and consolidate different applications with distinct levels of criticality into a single hardware platform [3]- [5]. This approach requires spatial, temporal, and fault isolation among all subsystems, ensuring that subsystems with lowercriticality do not compromise the timing, functionality, or performance of the safety-critical ones.…”
Section: Introductionmentioning
confidence: 99%
“…Self-virtualized devices were designed, from the ground-up, for servers and cloud requirements and materialized in the SRIOV for PCIe [23]. Preeminent solutions for IO virtualization for (embedded) mixed-criticality systems include BlueIO [30] and MCS-IOV [31].…”
Section: Self-virtualization Techniquementioning
confidence: 99%