Sándor Lukács, Andrei V. Lutas, Dan H. Lutas, G. Sebestyen
{"title":"Hardware virtualization based security solution for embedded systems","authors":"Sándor Lukács, Andrei V. Lutas, Dan H. Lutas, G. Sebestyen","doi":"10.1109/AQTR.2014.6857879","DOIUrl":null,"url":null,"abstract":"We describe the implementation and the evaluation of a hypervisor level, hardware-enforced security solution suitable for the latest embedded platforms. Our solution is based on thin layer bare-metal hypervisor, a memory introspection engine and is validated on Silvermont microarchitecture based Intel x86 processors, running Windows. The approach is well suited to enhance the security of many POS and industrial embedded devices. We also present various kinds of attacks our solution defends against, and several remaining limitations.","PeriodicalId":297141,"journal":{"name":"2014 IEEE International Conference on Automation, Quality and Testing, Robotics","volume":"37 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE International Conference on Automation, Quality and Testing, Robotics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AQTR.2014.6857879","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
We describe the implementation and the evaluation of a hypervisor level, hardware-enforced security solution suitable for the latest embedded platforms. Our solution is based on thin layer bare-metal hypervisor, a memory introspection engine and is validated on Silvermont microarchitecture based Intel x86 processors, running Windows. The approach is well suited to enhance the security of many POS and industrial embedded devices. We also present various kinds of attacks our solution defends against, and several remaining limitations.