1 / 1

Co-design Environment for Secure Embedded Systems

Co-design Environment for Secure Embedded Systems. Embedded System Board. Embedded System Board. Embedded System Board. A DSML Example with the Security Extension AADL with RBAC and Partitioning. Incorporating Security into DSMLs Advantages of Design Time Security Modeling.

fauna
Download Presentation

Co-design Environment for Secure Embedded Systems

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Co-design Environment for Secure Embedded Systems Embedded System Board Embedded System Board Embedded System Board A DSML Example with the Security Extension AADL with RBAC and Partitioning Incorporating Security into DSMLs Advantages of Design Time Security Modeling • Vulnerabilities • Access Violation • Violation of Autentication • Violation of Confidentiality • Violation of Integrity Architectural Analysis and Design Language (AADL) Role Based Access Control (RBAC) building blocks Domain Specific Modeling Language (DSML) examples Secure Code Generation • Standard by SAE Aerospace (AS5506) • Developed to model embedded systems with challenging resource constraints • Objects – subject to access control • Operations – execution of some functions on objects • Permissions – approval to perform operation on RBAC protected object • Roles – job with assigned authority and responsibility • Users – human being, machine, network or agent requesting operation on objects Source Files (ex: SimuLink, Hand crafted code, etc.) • SysML • AADL • UML Composition Platform (ex: AADL) OS Security Services (ex: Access Control, Partitioning) Security Extension examples HW/SW Architecture (ex: OS, Applications) • Partitioning • Role Based Access Control (RBAC) • Secure Links • Fair Exchange (guaranteed transactions) Platform Security Model Security Extension Metamodel Deployment Model Functional Models Component Models Definition of the AADL Language Generators (Interpreters) Componentized Model Security Models Secure Component Structure Model Comparison of AADL and the Security Extended AADL • Gain with the Security Extended AADL • Introducing security at design level • Consistent and automatic configuration of security services offered by the operating system and middleware • Investigating design tradeoffs between performance and security properties • Verifying required security properties using explicit security models AADL Execution Environment Plant Simulator Automatic Code Generation Code generators traverse the model and produce secure code that enforces the RBAC policies. The code generator makes use of the partitioning capabilities of the underlying platform. Data Acquisition Board (DAQ) Reference Application Software Component Application Software Component Application Software Component Application Software Component Application Software Component Application Software Component AADL Extended AADL 10/100BASE-T or 802.11b API The process of AADL code generation AADL Runtime System AADL Runtime System AADL Runtime System Platform Security / Security Service Modeling Abstracts out security properties of the platform that are essential for the design flow AADL Runtime System API OS Security Extension App App App Real-Time Operating System Automatic Code Generation and Deployment • Security Service Providers • OS (ex: Linux, LynxOS, WinCE) • HW (ex: Space Partitioning, Memory protection) • Services of different applications • (ex: Web Browser Based Authentication) Real-Time Operating System Embedded Hardware Target Embedded Hardware Target Existing Security Solutions Provided Different Platforms Theoretical Security Concepts (Platform Independent) Mapping between requirements and underlying capabilities ( Ideally requirements are the subset of the capabilities ) Security Capabilities of a Platform Security Requirements of a System Platform Security Models with sufficient detail enable Code Generators to access Platform Specific Security Services Matt Eby, Janos L. Mathe, Jan Werner, Gabor Karsai, Sandeep Neema, Janos Sztipanovits, Yuan XueInstitute for Software Integrated Systems, Vanderbilt University April 27-28, 2006

More Related