Feature: Software
The attack surface of a software environment is the sum of the diff erent points where an unauthorised user might try to insert or extract data
The processing system Autonomous vehicles, just like aircraſt , demand secure soſt ware platforms, which must be achieved without the massive overheads encountered in avionics. We see multicore heterogeneous processors that feature general-purpose processors, but also potentially GPGPUs, programmable logic, more specialist real-time cores hardware accelerators, and more. From a soſt ware perspective, there’s need to combine rich operating systems (like Linux) on which a wide set of applications can be used almost immediately, with a guaranteed real-time
determinism for certain functions. T e hypervisor layer will need to
simultaneously host safety-critical applications up to ISO 26262 ASIL D, support non-real-time OSs (such as Android and Linux), AUTOSAR (the AUTomotive Open Systems ARchitecture) kernels, and bare-metal applications. In several current systems, diverse
functionality makes them look heterogeneous, but, in reality, they are separate processing systems running diff erent soſt ware. T e shiſt to allocating processing of diff erent tasks more
dynamically, coupled with the industry’s desire to reduce lock-in to a specifi c vendor means that these systems are increasingly using hypervisor technology and executing diff erent operating systems and applications on top of them.
Separation kernel needed Virtualised embedded soſt ware architecture has traditionally placed much of the burden on the hypervisor and/or operating system, which creates platform dependencies, impacting performance (due to extra copies and context switches) and raising challenges due to: • Shared address space; • Shared CPU privileges; • Common arbitration points; • Global resource pools; • Compounding code branches; • Compounding control fl ow timing; • Large co-dependent code base to certify. Now this complexity has changed to
simplicity, with the hypervisor working seamlessly in the background.
Figure 1: LynxSecure implements independent separation kernel executables run on each CPU core
www.electronicsworld.co.uk September/October 2020 49
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52 |
Page 53 |
Page 54 |
Page 55 |
Page 56 |
Page 57 |
Page 58 |
Page 59 |
Page 60 |
Page 61 |
Page 62 |
Page 63 |
Page 64 |
Page 65 |
Page 66 |
Page 67 |
Page 68