Chapter 2
Systems Software Considerations
Chapter Outline
2.1 The Role of the Operating System
2.2 Multiple Independent Levels of Security
2.2.1 Information Flow
2.2.2 Data Isolation
2.2.3 Damage Limitation
2.2.4 Periods Processing
2.2.5 Always Invoked
2.2.6 Tamper Proof
2.2.7 Evaluable
2.3 Microkernel versus Monolith
2.4 Core Embedded Operating System Security Requirements
2.4.1 Memory Protection
2.4.2 Virtual Memory
2.4.2.1 Guard Pages
2.4.2.2 Location Obfuscation
2.4.3 Fault Recovery
2.4.4 Guaranteed Resources
2.4.5 Virtual Device Drivers
2.4.6 Impact of Determinism
2.4.7 Secure Scheduling
Get Embedded Systems Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.