Proceedings of the 28th Annual ACM Symposium on Applied Computing 2013
DOI: 10.1145/2480362.2480640
|View full text |Cite
|
Sign up to set email alerts
|

Virtualization for safety-critical, deeply-embedded devices

Abstract: Even today, safety-critical systems in many fields of application use separate processors to isolate software of different criticality from another. The resulting system architecture is non-optimal in regard to flexibility, device size and power consumption. These drawbacks can be prevented by the use of partitioning operating systems that enable the integration of applications with different criticality on a single processor. However, their application for deeply-embedded devices, that are characterized by st… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…Classic approaches to provide isolation and implement reliable systems on low-end embedded devices have been evolving from constructive (language/compiler-based) memory protection [58]- [62] and hardware-enforced RTOS mechanisms [21], [63], [64], to lightweight virtualization infrastructures [4], [5], [65], [66]. Tock [59] leverages limited hardware protection mechanisms as well as the type-safety features of the Rust programming language to provide a reliable multiprogramming environment for MCUs.…”
Section: Reliable Systems For Mcu-powered Iot Devicesmentioning
confidence: 99%
See 1 more Smart Citation
“…Classic approaches to provide isolation and implement reliable systems on low-end embedded devices have been evolving from constructive (language/compiler-based) memory protection [58]- [62] and hardware-enforced RTOS mechanisms [21], [63], [64], to lightweight virtualization infrastructures [4], [5], [65], [66]. Tock [59] leverages limited hardware protection mechanisms as well as the type-safety features of the Rust programming language to provide a reliable multiprogramming environment for MCUs.…”
Section: Reliable Systems For Mcu-powered Iot Devicesmentioning
confidence: 99%
“…Another class of approaches have proposed lightweight virtualization solutions for resource-constrained devices. F. Bruns et al [65] and R. Pan et al [4] have proposed virtualization infrastructures leveraging the MPU. Pinto et al [5] have also proposed a TrustZone-based virtualization solution for Cortex-M MCUs.…”
Section: Reliable Systems For Mcu-powered Iot Devicesmentioning
confidence: 99%
“…Reliable systems for the IoT. Classic approaches to provide isolation and implement reliable systems on resourceconstrained devices have been evolving from constructive (language/compiler-based) memory protection [52]- [56] and hardware-enforced RTOS mechanisms [21], [57], [58], to lightweight virtualization infrastructures [5], [6], [59], [60]. Tock [53] leverages limited hardware protection mechanisms as well as the type-safety features of the Rust programming language to provide a reliable multiprogramming environment for MCUs.…”
Section: Related Workmentioning
confidence: 99%
“…F. Paci et al [60] proposed a lightweight I/O virtualization approach using the MPU support on FreeRTOS to create a task which mediates all I/O accesses. F. Bruns et al [59] and R. Pan et al [5] have proposed virtualization infrastructures leveraging the MPU. Pinto et al [6] have also proposed a TrustZone-based virtualization solution for Cortex-M MCUs.…”
Section: Related Workmentioning
confidence: 99%
“…This not only concerns the backend side of the system, but also the physical world where the data is coming from. The real-time constraints and requirements of deeply embedded devices with limited resources can be addressed by virtualization [7] A malfunctioning sensor could cause a failure in data transmission, which could potentially result in harm to the users. Similarly, the accuracy of the collected data is very important.…”
Section: A Safetymentioning
confidence: 99%