Home  /  Electronics  /  Vol: 6 Núm: 4 Par: Decembe (2017)  /  Article
ARTICLE
TITLE

µRTZVisor: A Secure and Safe Real-Time Hypervisor

SUMMARY

Virtualization has been deployed as a key enabling technology for coping with the ever growing complexity and heterogeneity of modern computing systems. However, on its own, classical virtualization is a poor match for modern endpoint embedded system requirements such as safety, security and real-time, which are our main target. Microkernel-based approaches to virtualization have been shown to bridge the gap between traditional and embedded virtualization. This notwithstanding, existent microkernel-based solutions follow a highly para-virtualized approach, which inherently requires a significant software engineering effort to adapt guest operating systems (OSes) to run as userland components. In this paper, we present µ RTZVisor as a new TrustZone-assisted hypervisor that distinguishes itself from state-of-the-art TrustZone solutions by implementing a microkernel-like architecture while following an object-oriented approach. Contrarily to existing microkernel-based solutions, µ RTZVisor is able to run nearly unmodified guest OSes, while, contrarily to existing TrustZone-assisted solutions, it provides a high degree of functionality and configurability, placing strong emphasis on the real-time support. Our hypervisor was deployed and evaluated on a Xilinx Zynq-based platform. Experiments demonstrate that the hypervisor presents a small trusted computing base size (approximately 60KB), and a performance overhead of less than 2% for a 10 ms guest-switching rate.

 Articles related

Norhaiza bt Ya Abdullah    

Currently in this era, applications for mobile platforms are being developed at a tremendous rate, but often without proper security implementation. Therefore, can cause serious information security and data privacy issues and can have severe impacts on ... see more


Muhammad Faisal Adlan    

Nowadays people keep their data in the internet storage also known as cloud storage. The capability of cloud storage is keep the data in a larger amount of size. It can be access anywhere, anytime and it is very fast to view the file that has been kept. ... see more


Samiha Abdelrahman Mohammed Marwan,Ahmed Shawish,Khaled Nagaty    

There are continuous threats to network technologies due to its rapidly-changing nature, which raises the demand for data-safe transmission. As a result, the need to come up with new techniques for securing data and accommodating the growing quantities o... see more


Freda Mold,Beverley Ellis,Simon de Lusignan,Aziz Sheikh,Jeremy C Wyatt,Mary Cavill,Georgios Michalakidis,Fiona Barker,Azeem Majeed,Tom Quinn,Phil Koczan,Theo Avanitis,Toto Anne Gronlund,Christina Franco,Mary McCarthy,Zoe Renton,Umesh Chauhan,Hannah Blakey,Neha Kataria,Simon Jones,Imran Rafi    

Background Innovators have piloted improvements in communication, changed patterns of practice and patient empowerment from online access to electronic health records (EHR). International studies of online services, such as prescription ordering, online ... see more


Dennis O. Laryea,Fred K. Awittor    

ObjectiveTo discuss the implementation of confidentiality practices at theKumasi Cancer Registry.IntroductionCancer registration involves collecting information on patientswith cancer. Population-based cancer registries in particular areuseful in estimat... see more