skip to main content
10.1145/1982185.1982261acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

Design issues in composition kernels for highly functional embedded systems

Published: 21 March 2011 Publication History

Abstract

Recent embedded systems are dramatically increasing their features to satisfy a user's demanding requirements. In traditional approaches, each feature uses a dedicated processor to be implemented, but the approach increases the cost to develop highly functional embedded systems. A multi-core processor offers a new opportunity to solve the dilemma because various functionalities can be implemented on one multi-core processor. While the number of functionalities is increased, we can just add more cores in the multi-core processor. However, we need a desirable software platform to implement a large number of functionalities on a multi-core processor for developing highly functional embedded systems.
A composition kernel makes it possible to compose multiple functionalities on a multi-core processor with the minimum modifications of OS kernels and applications. In this paper, we present SPUMONE, a composition kernel for developing highly functional embedded systems, and runs on the SH4-based multi-core processor. SPUMONE does not support the spatial isolation to isolate guest OSes not to sacrifice the performance due to its virtualization. The approach may sacrifice the reliability and security, so we also propose to add the monitoring service that runs in the outside of a target guest OS to enhance its reliability and security without relying on the spatial isolation.

References

[1]
Open kernel labs: Okl4. http://www.ok-labs.com/products/okl4.
[2]
Rtai - the realtime application interface for linux from diapm. https://www.rtai.org/.
[3]
Rtlinuxfree. http://www.rtlinuxfree.com/.
[4]
Virtuallogix homepage. http://www.virtuallogix.com/.
[5]
F. Armand and M. Gien. A practical look at micro-kernels and virtual machine monitors. pages 1--7, jan. 2009.
[6]
L. A. Ashvin, L. Abeni, A. Goel, C. Krasic, J. Snow, and J. Walpole. A measurement-based analysis of the real-time performance of linux, 2002.
[7]
A. Baliga, V. Ganapathy, and L. Iftode. Automatic inference and enforcement of kernel data structure invariants. In Proc. Annual Computer Security Applications Conference ACSAC 2008, pages 77--86, Dec. 8--12, 2008.
[8]
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the art of virtualization. In SOSP '03: Proceedings of the nineteenth ACM symposium on Operating systems principles, pages 164--177, New York, NY, USA, 2003. ACM.
[9]
M. D. Ernst, J. H. Perkins, P. J. Guo, S. McCamant, C. Pacheco, M. S. Tschantz, and C. Xiao. The daikon system for dynamic detection of likely invariants. Sci. Comput. Program., 69(1--3): 35--45, 2007.
[10]
J. Finkle. Software released for attacking android phones. http://www.reuters.com/article/idUSTRE66T52O20100730.
[11]
G. Heiser. The role of virtualization in embedded systems. In IIES '08: Proceedings of the 1st workshop on Isolation and integration in embedded systems, pages 11--16, New York, NY, USA, 2008. ACM.
[12]
H. HÃd'rtig, M. Hohmuth, and J. Wolter. Taming linux. In In Proceedings of the 5th Annual Australasian Conference on Parallel And Real-Time Systems (PART âĂŹ98, 1998.
[13]
X. Jiang, X. Wang, and D. Xu. Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction. In CCS '07: Proceedings of the 14th ACM conference on Computer and communications security, pages 128--138, New York, NY, USA, 2007. ACM.
[14]
S. T. Jones, A. C. Arpaci-Dusseau, and R. H. Arpaci-Dusseau. Vmm-based hidden process detection and identification using lycosid. In VEE '08: Proceedings of the fourth ACM SIGPLAN/SIGOPS international conference on Virtual execution environments, pages 91--100, New York, NY, USA, 2008. ACM.
[15]
G. H. Kim and E. H. Spafford. The design and implementation of tripwire: a file system integrity checker. In CCS '94: Proceedings of the 2nd ACM Conference on Computer and communications security, pages 18--29, New York, NY, USA, 1994. ACM.
[16]
A. Kivity, K. Yaniv, L. Dor, L. Uri, and L. Anthony. kvm: the linux virtual machine monitor. Proceedings of the Linux Symposium, Ottawa, Ontario, 2007, 2007.
[17]
H. Mitake, Y. Kinebuchi, A. Courbot, and T. Nakajima. Handling lock-holder preemption in real-time virtualization layer for multicore processors. The 16th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications-Work In Progress Sessions, 2010.
[18]
P. R. Panda, N. D. Dutt, and A. Nicolau. Efficient utilization of scratch-pad memory in embedded processor applications. In EDTC '97: Proceedings of the 1997 European conference on Design and Test, page 7, Washington, DC, USA, 1997. IEEE Computer Society.
[19]
J. Rhee, R. Riley, D. Xu, and X. Jiang. Defeating dynamic data kernel rootkit attacks via vmm-based guest-transparent monitoring. In Proc. International Conference on Availability, Reliability and Security ARES '09, pages 74--81, Mar. 16--19, 2009.
[20]
H. Xu and S. J. Chapin. Address-space layout randomization using code islands. J. Comput. Secur., 17(3): 331--362, 2009.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SAC '11: Proceedings of the 2011 ACM Symposium on Applied Computing
March 2011
1868 pages
ISBN:9781450301138
DOI:10.1145/1982185
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 21 March 2011

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. embedded systems
  2. monitoring service
  3. real-time operating system
  4. virtualization

Qualifiers

  • Research-article

Conference

SAC'11
Sponsor:
SAC'11: The 2011 ACM Symposium on Applied Computing
March 21 - 24, 2011
TaiChung, Taiwan

Acceptance Rates

Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 219
    Total Downloads
  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Sep 2024

Other Metrics

Citations

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media