{"title":"A secure isolation of software activities in tiny scale systems","authors":"Oliver Stecklina","doi":"10.1109/PERCOMW.2015.7134037","DOIUrl":null,"url":null,"abstract":"All visions of pervasive computing share the idea of smart, small, and cheap devices that improve our everyday life. Their applications typically fall under sensor-based communication-enabled autonomous and deeply embedded monitor and control systems. But common smart sensors and deeply embedded controllers are also able to do many things that we do not want. In fact, they will be always vulnerable to doing the bidding of attackers, to the detriment of their owners. This work presents a concept of a security architecture for tiny scale devices, which are typically close to the physical elements and featured with very limited resources. The concept describes a compile- and run-time co-design process to bring a tailor-made implementation of well-understood technologies of desktop systems on this type of devices to enforce an adequate security level.","PeriodicalId":180959,"journal":{"name":"2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PERCOMW.2015.7134037","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
All visions of pervasive computing share the idea of smart, small, and cheap devices that improve our everyday life. Their applications typically fall under sensor-based communication-enabled autonomous and deeply embedded monitor and control systems. But common smart sensors and deeply embedded controllers are also able to do many things that we do not want. In fact, they will be always vulnerable to doing the bidding of attackers, to the detriment of their owners. This work presents a concept of a security architecture for tiny scale devices, which are typically close to the physical elements and featured with very limited resources. The concept describes a compile- and run-time co-design process to bring a tailor-made implementation of well-understood technologies of desktop systems on this type of devices to enforce an adequate security level.