read/write from/to the specified address. We have
partly implemented our MPU in a co-simulation en-
vironment. There we could prove that the memory
access verification can be done within a single clock
cycle, i.e. that this protection scheme can be applied
without performance penalty.
Beside the isolation of software entities their vir-
tualization can improve the robustness of the whole
system against denial of service attacks. The Hyper-
visor is fairly scheduling the virtualized systems so
that the affected instance can capture only a piece of
the available computing time. The attack is limited on
the affected virtualized system and in case of an dis-
tributed and well-defined system design critical ser-
vices can be still available.
Our approach is still work in progress so that we
are not able to completely validate our concept and
providing sophisticated measurement results. But our
performance assessments clearly indicate that hori-
zontal isolation is a valid concept to improve the se-
curity and by that reliability of MCUs.
ACKNOWLEDGEMENTS
The research leading to these results has received
funding from the European Community’s Seventh
Framework Program (FP7/2007-2013) under grant
agreement No.258754.
REFERENCES
Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T.,
Ho, A., Neugebauer, R., Pratt, I., and Warfield, A.
(2003). Xen and the art of virtualization. In SOSP
’03: Proceedings of the nineteenth ACM symposium
on Operating systems principles, pages 164–177, New
York, NY, USA. ACM.
Bellard, F. (2005). Qemu, a fast and portable dynamic trans-
lator. In ATEC ’05: Proceedings of the annual confer-
ence on USENIX Annual Technical Conference, pages
41–41, Berkeley, CA, USA. USENIX Association.
Brumley, D. and Song, D. X. (2004). Privtrans: Automat-
ically partitioning programs for privilege separation.
In USENIX Security Symposium, pages 57–72.
Cha, H., Choi, S., Jung, I., Kim, H., Shin, H., Yoo, J.,
and Yoon, C. (2007). RETOS: resilient, expandable,
and threaded operating system for wireless sensor net-
works. In IPSN ’07: Proceedings of the 6th interna-
tional conference on Information processing in sen-
sor networks, pages 148–157, New York, NY, USA.
ACM.
Eriksson, J., Dunkels, A., Finne, N.,
¨
Osterlind, F., Voigt,
T., and Tsiftes, N. (2008). Demo abstract: MSPsim
- an extensible simulator for MSP430-equipped sen-
sor boards. In Proceedings of the 5th European Con-
ference on Wireless Sensor Networks (EWSN 2008),
Bologna, Italy.
Francillon, A. and Castelluccia, C. (2008). Code injec-
tion attacks on harvard-architecture devices. In CCS
’08: Proceedings of the 15th ACM conference on
Computer and communications security, pages 15–26,
New York, NY, USA. ACM.
Francillon, A., Perito, D., and Castelluccia, C. (2009). De-
fending embedded systems against control flow at-
tacks. In SecuCode ’09: Proceedings of the first
ACMworkshop on Secure execution of untrusted code,
pages 19–26, New York, NY, USA. ACM.
IBM (1964). IBM system/360 principles of operation. IBM
Press.
Kilpatrick, D. (2003). Privman: A Library for Partitioning
Applications. In USENIX Annual Technical Confer-
ence, FREENIX Track, pages 273–284.
Kumar, R., Singhania, A., Castner, A., Kohler, E., and
Srivastava, M. (2007). A system for coarse grained
memory protection in tiny embedded processors. In
DAC ’07: Proceedings of the 44th annual Design Au-
tomation Conference, pages 218–223, New York, NY,
USA. ACM.
Levis, P. and Culler, D. (2002). Mat´e: a tiny virtual ma-
chine for sensor networks. In ASPLOS-X: Proceed-
ings of the 10th international conference on Archi-
tectural support for programming languages and op-
erating systems, pages 85–95, New York, NY, USA.
ACM.
Levis, P., Madden, S., Polastre, J., Szewczyk, R., Woo, A.,
Gay, D., Hill, J., Welsh, M., Brewer, E., and Culler,
D. (2004). TinyOS: An operating system for sensor
networks. In in Ambient Intelligence. Springer Verlag.
Lopriore, L. (2008). Hardware/Compiler Memory Protec-
tion in Sensor Nodes. International Journal of Com-
munications, Network and System Sciences, 1(3):235–
240.
M¨uller, R., Alonso, G., and Kossmann, D. (2007). A virtual
machine for sensor networks. In EuroSys ’07: Pro-
ceedings of the 2nd ACM SIGOPS/EuroSys European
Conference on Computer Systems 2007, pages 145–
158, New York, NY, USA. ACM.
Stilkerich, M., Lohmann, D., and Schr¨oder-Preikschat, W.
(2010). Memory protection at option. In CARS ’10:
Proceedings of the 1st Workshop on Critical Automo-
tive applications, pages 17–20, New York, NY, USA.
ACM.
Thomm, I., Stilkerich, M., Wawersich, C., and Schr¨oder-
Preikschat, W. (2010). Keso: an open-source multi-
jvm for deeply embedded systems. In Proceedings of
the 8th International Workshop on Java Technologies
for Real-Time and Embedded Systems, JTRES ’10,
pages 109–119, New York, NY, USA. ACM.
TOWARDS A SECURE ADDRESS SPACE SEPARATION FOR LOW POWER SENSOR NODES
517