Skip to Main content Skip to Navigation
Conference papers

A path to scale up proven hardware-based security in constrained objects

Abstract : The Internet of Things is revolutionizing the established embedded systems market. However, embedded system designers aren't traditionnally considering security as a top concern and consider maintaining their current tools and technologies while opening to connectivity. It is thus expected the embedded systems sector will suffer massively from cyberattacks with the risk to break down traditional IT systems with them. This article demonstrates how this situation is a plausible scenario given the current context and exposes how the existing means to build and secure constrained devices are not sufficient enough to reduce the risks. As a countermeasure, we propose the creation of isolated hardware-enforced trustworthy environments targetting constrained devices in need of strong guarantees by adapting the formally proven Pip protokernel. We explore as well what considerations must be beared in mind to scale up the adoption of the proposed solution.
Complete list of metadata
Contributor : Nicolas Dejon Connect in order to contact the contributor
Submitted on : Monday, August 9, 2021 - 12:00:55 PM
Last modification on : Tuesday, January 4, 2022 - 6:14:28 AM
Long-term archiving on: : Wednesday, November 10, 2021 - 6:22:24 PM


Files produced by the author(s)


  • HAL Id : hal-03318088, version 1



Nicolas Dejon, Chrystel Gaber, Gilles Grimaud. A path to scale up proven hardware-based security in constrained objects. Conférence francophone d'informatique en Parallélisme, Architecture et Système (COMPAS 2020), Jun 2020, Lyon, France. ⟨hal-03318088⟩



Les métriques sont temporairement indisponibles