A path to scale up proven hardware-based security in constrained objects - Archive ouverte HAL Accéder directement au contenu
Communication Dans Un Congrès Année : 2020

A path to scale up proven hardware-based security in constrained objects

Résumé

The Internet of Things is revolutionizing the established embedded systems market. However, embedded system designers aren't traditionnally considering security as a top concern and consider maintaining their current tools and technologies while opening to connectivity. It is thus expected the embedded systems sector will suffer massively from cyberattacks with the risk to break down traditional IT systems with them. This article demonstrates how this situation is a plausible scenario given the current context and exposes how the existing means to build and secure constrained devices are not sufficient enough to reduce the risks. As a countermeasure, we propose the creation of isolated hardware-enforced trustworthy environments targetting constrained devices in need of strong guarantees by adapting the formally proven Pip protokernel. We explore as well what considerations must be beared in mind to scale up the adoption of the proposed solution.
Fichier principal
Vignette du fichier
compas2020.pdf (139.92 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)

Dates et versions

hal-03318088 , version 1 (09-08-2021)

Identifiants

  • HAL Id : hal-03318088 , version 1

Citer

Nicolas Dejon, Chrystel Gaber, Gilles Grimaud. A path to scale up proven hardware-based security in constrained objects. Conférence francophone d'informatique en Parallélisme, Architecture et Système (COMPAS 2020), Jun 2020, Lyon, France. ⟨hal-03318088⟩
47 Consultations
77 Téléchargements

Partager

Gmail Facebook X LinkedIn More