A Systematic Security Design Approach for Heterogeneous Embedded Systems

Author(s):  
Yibo Zhang
Author(s):  
Martin Zauner ◽  
Michael Kramer ◽  
Peter Balog

New design methodologies at higher abstraction levels are necessary to deal with the increasing complexity of modern embedded systems. As a consequence, new design paradigms must supersede traditional design methods to bridge the abstraction gap which often exists between specification and implementation. This paper examines several examples which evaluate the applicability of Esterel, a language with well-defined semantics for specification and verification of reactive control systems. Implementation size, performance and design effort were selected as measures to assess the benefits of this design approach in comparison to a traditional one.


2021 ◽  
Author(s):  
Mir Ahsan

Embedded systems are often used to monitor and control various dynamic and complex applications. However, with greater accessibility and added features on many embedded systems, more and more systems are being subject to sophisticated and new types of attacks. As a result, the security aspect of embedded systems has become critical design step. TrustZone has become a popular choice for security design solution in systems where resources such as processing power, battery are limited. In TrustZone, two virtual processors called "secure world" and “normal world” run on the same core in a time sliced manner. These worlds have partitioned hardware and software resources, with different modes of operation, isolated memory regions and interrupts. In this paper, the hardware and software architecture of TrustZone is analyzed from the perspective of embedded system security design. Then a mobile-ticketing system based on TrustZone is presented which incorporates standard cryptographic engineering design practices to demonstrate the feasibility and effectiveness of such system. The ticketing system is then simulated and security threat analysis is performed in terms known vulnerabilities such as Buffer Overflow, Static and dynamic code/data tampering, Return Oriented Programming (ROP) exploits, and Man-in-the middle attacks. After evaluating the analysis results with various open source vulnerability analysis tools, it is conclusive that the system design is an effective solution particularly for embedded systems.


Sign in / Sign up

Export Citation Format

Share Document