Constructing secure operating environments by co-locating multiple embedded operating systems

Shuichi Oikawa, Hiroo Ishikawa, Masatoshi Iwasaki, Tatsuo Nakajima

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

Embedded operating system (OS) kernels provide basic execution primitives that can be used commonly by many appliances. The recent emergence of digital appliances requires more advanced features, such as networking and GUI. Those features dramatically complicate the appliances' software systems and increase their code sizes. In order to develop such large and complex software systems, we propose a system architecture that co-locates multiple embedded operating systems on a microkernel. The proposed architecture employs a microkernel to provide protected execution environments for the existing embedded kernels. In each protected execution environment, a kernel and its applications run just as they run directly on hardware since they share the same protection domain. Our approach can achieve the maximum reusability of the existing software resources including embedded OS kernels and their applications; thus, it protects the existing software resources. We have developed the system that consists of TL4 microkernel and a μITRON embedded kernel, and shows the feasibility of our approach through evaluations.

Original languageEnglish
Title of host publication2005 2nd IEEE Consumer Communications and Networking Conference, CCNC2005
Pages43-48
Number of pages6
Publication statusPublished - 2005 Dec 1
Event2005 2nd IEEE Consumer Communications and Networking Conference, CCNC2005 - Las Vegas, NV, United States
Duration: 2005 Jan 32005 Jan 6

Publication series

Name2005 2nd IEEE Consumer Communications and Networking Conference, CCNC2005
Volume2005

Conference

Conference2005 2nd IEEE Consumer Communications and Networking Conference, CCNC2005
CountryUnited States
CityLas Vegas, NV
Period05/1/305/1/6

ASJC Scopus subject areas

  • Engineering(all)

Fingerprint Dive into the research topics of 'Constructing secure operating environments by co-locating multiple embedded operating systems'. Together they form a unique fingerprint.

  • Cite this

    Oikawa, S., Ishikawa, H., Iwasaki, M., & Nakajima, T. (2005). Constructing secure operating environments by co-locating multiple embedded operating systems. In 2005 2nd IEEE Consumer Communications and Networking Conference, CCNC2005 (pp. 43-48). [1405141] (2005 2nd IEEE Consumer Communications and Networking Conference, CCNC2005; Vol. 2005).