CSE597a - Cell Phone OS Security. Cellphone Hardware. William Enck Prof. Patrick McDaniel

Size: px
Start display at page:

Download "CSE597a - Cell Phone OS Security. Cellphone Hardware. William Enck Prof. Patrick McDaniel"

Transcription

1 CSE597a - Cell Phone OS Security Cellphone Hardware William Enck Prof. Patrick McDaniel CSE597a - Cellular Phone Operating Systems Security - Spring Instructors McDaniel and Enck 1

2 2 Embedded Systems Embedded systems consist of many small components put together to comprise the system. Frequenly contain many microcontrollers and mini-oses. Embedded systems design is a trade-off between performance, size, and cost. Performance comes in many flavors, e.g., processing and power consumption Frequently, performance is sacrificed for smaller and cheaper devices Small variations in price are significant at large volumes Smartphones are upper scale embedded devices, but they are still embedded systems, and subject to many such constraints

3 3 Handset Architecture Most mobile handsets comprise of two main processors (baseband and application) and peripheral-specific logic cores Commonly, a System-on-Chip (SoC) for the application processor and peripheral-specific logic. Sometimes the baseband processor is included on that SoC SoC means more efficient data transfers and lower exposure to potential physical attackers Camera Apps Bluetooth GPS Display Keyboard Middleware RIL OS Kernel App Processor AT cmds serial, UART, shared memory Baseband radio stack Baseband processor Modem Rx/Tx SIM Card

4 4 Peripherals Consumers choose devices based on functionality. Frequently, this includes hardware peripherals Standard peripherals: display, keyboard (or touchscreen), microphone, speaker (w/ headset), camera (more pixels is better) Emerging standard peripherals: GPS, accelerometer, compass, video acceleration, graphics acceleration, FM radio Functional Block Diagram for TI OMAP3530

5 5 Location Services GPS navigation devices are common in vehicles. A conventional GPS devices uses measurements ([x,y,z,t]) from four satellites. In certain cases, the fourth satellite used to update clock. GPS has problems while indoor or around tall buildings. This is fine when driving on the freeway, but bad in cities, and bad for phones More common in mobile phones is Assisted-GPS (A-GPS) Location of cell site (also useful without GPS) Compare fragments from phones Supply satellite positions Error correcting information (ionospheric conditions) Offload work to assistance server

6 6 Modem Processor Voice and data communications processing is intensive. For realtime and security reasons, a separate baseband processor and OS exist (no need for RTOS or preemption for App OS). More and more frequently, the broadband (aka modem or communications) processor is located on the same silicon chip as the application and peripheral logic. Separate ARM core (DSP extensions) and sometimes modem accelerators. Broadcom BCM2153

7 7 Application Processor The application processor runs the operating system that interacts with the user... consumer focus The phone is becoming a general purpose computing device New phones support full featured operating systems based on Linux, Mac OS X, and Windows Hardware includes MMU, DMA, multi-gb storage, etc... however, handsets are still embedded systems and require many optimizations for the constrained environment Sometimes like a clown on a tiny tricycle...

8 8 ARM Architecture Almost all mobile phones use an ARM-based processor ARM based processors are very common in embedded systems. For example, Game Boy Advance, Nintendo DS, and ipod use an ARMv4T processor. Many smartphones use ARMv5 or ARMv6 architectures. Naming is a big mess: Family vs. Architecture vs. core. Example, iphone uses ARM11 family, ARMv6KZ architecture, and ARM1176JZ(F)-S core (which has SIMD, Jazelle DBZ, and TrustZone...) ARM Ltd. doesn t actually sell hardware chips Licenses Intellectual Property (IP) to merchant foundries for chip (SoC) designs Long history of low transistor count: ARM2 was 30,000 transistors when Motorola was around 70,000 (6 year older design)

9 9 Jazelle DBX Many embedded devices use Java (this is Java s origin), therefore, some ARM cores include the Jazelle DBX technology Direct Bytecode execution (DBX) First introduced in the ARM926EJ-S core (ARMv5TEJ architecture) A Jazelle-aware Java virtual machine can branch (BXJ) to Java bytecode Incomplete set of specifications published (allows OS to run Jazelle-aware JVM, but not enough information to the JVM)

10 10 Memory Protection MMU and protection varies between families and architectures... however, let s look at the ARM1176JZF-S Processes are either user or privileged (multiple privileged) Memory regions grouped into domains ; access permissions specified at the domain level Domains accessed as either a client or manager identified by system register (allows fast switching w/out TLB flush) Access determined by AP[1:0] and APX bits in page table (and TLB). They cause different R/W behavior depending if user or privileged Execute Never (XN) bit restricts page execution Additional protection provided by TrustZone...

11 11 ARM TrustZone TrustZone provides a processor abstraction providing two virtual CPUs that execute on one physical CPU. This defines a normal world and a secure world. The secure OS is often used less frequently. We want the isolation, but don t want to waste chip real estate. TrustZone is typically only a 5% area overhead Virtual CPUs also allow fast and efficient (speed, power) data transfers Included in ARM1176JZ(F)-S (good for documentation) (from ARM1176JZF-S Documentation)

12 12 Why TrustZone? The Secure OS can perform tasks such as protect access to keys (SIM lock functionality) or DRM (decode music). It allows arbitrary secure services to be defined with client stubs (using TrustZone API) in normal OS. Also protects security sensitive hardware (e.g., secure storage) SoC provides many security advantages. Of most note is the inability to place a reader on data lines (or at least much harder). Security state is propagated on the SoC bus

13 13 Memory Address Spaces TrustZone adds the Non Secure (NS) bit to the address space {NS, address[31:0]} {1,0xFFFFFFFF} {1,0x } {0,0xFFFFFFFF} {0,0x } Normal World Operation Peripherals (OS and Apps) Normal page tables Normal vectors Not accessible Secure World Operation Peripherals (OS and Apps) Normal page tables Normal vectors Peripherals (OS and Apps) Secure page tables Secure vectors

14 14 Secure Bus via ARM AXI On memory access, CPU security state provided on bus Use ARM s AXI (AMBA Extended Interface) Two bits: awprot[1] (write) and arprot[1] (read) Low = secure; high = nonsecure (just like NS bit) If a secure device (e.g., co-processor) on the bus is access when the processor is in nonsecure mode, it can detect the state and return peripheral does not exist at this address error E.g., crypto key in register

15 Mode Switching There are three basic modes that a TrustZone enhanced CPU can be put into: normal, secure, and monitor. The normal OS initiates a change into the secure OS via an exception model, e.g., the explicit secure monitor call (SMC). This puts the CPU in monitor mode, which stores the normal OS CPU registers, restores secure OS CPU registers, and branches to the secure OS. A similar process occurs in reverse. Each mode has it s own vector table. The monitor mode vector table can be to automatically override vector entries in normal and secure worlds Note: The monitor is a small OS in of itself (must be developed) CSE597a - Cellular Phone Operating Systems Security - Spring Instructors McDaniel and Enck Priv Mode SMC User Mode Normal World Monitor Priv Mode User Mode Secure World 15

16 16 TrustZone for Virtualization You may have noticed that the monitor OS acts as a limited hypervisor to switch between the normal and secure worlds However, the TrustZone model allows normal world OS to schedule secure world... but this need not be the case Recall that 1) the monitor stores and restores registers and 2) the monitor s vector table can override normal vectors This can give us an architecture similar to Xen (work being done at Samsung) Secure world OS acts as dom0 Monitor switches between multiple guest normal world OSes Do we gain anything over Xen w/out TrustZone?

17 17 TrustZone Software The TrustZone software suite provides secure service and client APIs. Along with cryptography and secure storage facilities for use by services Client API includes secure channel driver operates similar to DMA and controls secure world scheduling Software API allows new services to be created (type-safe API) e.g., for DRM or SIM-locking Native services in SSDI Java services in STIP (Small Terminal Interoperability Platform API), which includes a byte-code verifier Limited public implementations (combined with TCG by Winter, STC 08)

Hardware accelerated Virtualization in the ARM Cortex Processors

Hardware accelerated Virtualization in the ARM Cortex Processors Hardware accelerated Virtualization in the ARM Cortex Processors John Goodacre Director, Program Management ARM Processor Division ARM Ltd. Cambridge UK 2nd November 2010 Sponsored by: & & New Capabilities

More information

ARM Microprocessor and ARM-Based Microcontrollers

ARM Microprocessor and ARM-Based Microcontrollers ARM Microprocessor and ARM-Based Microcontrollers Nguatem William 24th May 2006 A Microcontroller-Based Embedded System Roadmap 1 Introduction ARM ARM Basics 2 ARM Extensions Thumb Jazelle NEON & DSP Enhancement

More information

The Future of the ARM Processor in Military Operations

The Future of the ARM Processor in Military Operations The Future of the ARM Processor in Military Operations ARMs for the Armed Mike Anderson Chief Scientist The PTR Group, Inc. http://www.theptrgroup.com What We Will Talk About The ARM architecture ARM performance

More information

Leveraging Thin Hypervisors for Security on Embedded Systems

Leveraging Thin Hypervisors for Security on Embedded Systems Leveraging Thin Hypervisors for Security on Embedded Systems Christian Gehrmann A part of Swedish ICT What is virtualization? Separation of a resource or request for a service from the underlying physical

More information

Virtualization in the ARMv7 Architecture Lecture for the Embedded Systems Course CSD, University of Crete (May 20, 2014)

Virtualization in the ARMv7 Architecture Lecture for the Embedded Systems Course CSD, University of Crete (May 20, 2014) Virtualization in the ARMv7 Architecture Lecture for the Embedded Systems Course CSD, University of Crete (May 20, 2014) ManolisMarazakis ([email protected]) Institute of Computer Science (ICS) Foundation

More information

Sierraware Overview. Simply Secure

Sierraware Overview. Simply Secure Sierraware Overview Simply Secure Sierraware Software Suite SierraTEE/Micro Kernel TrustZone/GlobalPlatform TEE SierraVisor: Bare Metal Hypervisor Hypervisor for ARM Para-virtualization, TrustZone Virtualization,

More information

A Survey on ARM Cortex A Processors. Wei Wang Tanima Dey

A Survey on ARM Cortex A Processors. Wei Wang Tanima Dey A Survey on ARM Cortex A Processors Wei Wang Tanima Dey 1 Overview of ARM Processors Focusing on Cortex A9 & Cortex A15 ARM ships no processors but only IP cores For SoC integration Targeting markets:

More information

Mobile Operating Systems. Week I

Mobile Operating Systems. Week I Mobile Operating Systems Week I Overview Introduction Mobile Operating System Structure Mobile Operating System Platforms Java ME Platform Palm OS Symbian OS Linux OS Windows Mobile OS BlackBerry OS iphone

More information

Android Virtualization from Sierraware. Simply Secure

Android Virtualization from Sierraware. Simply Secure Android Virtualization from Sierraware Simply Secure Integration Challenges DRM Mandates TrustZone TEE Hypervisor provides the flexibility and security needed for BYOD Power management, responsibility

More information

ADVANCED PROCESSOR ARCHITECTURES AND MEMORY ORGANISATION Lesson-12: ARM

ADVANCED PROCESSOR ARCHITECTURES AND MEMORY ORGANISATION Lesson-12: ARM ADVANCED PROCESSOR ARCHITECTURES AND MEMORY ORGANISATION Lesson-12: ARM 1 The ARM architecture processors popular in Mobile phone systems 2 ARM Features ARM has 32-bit architecture but supports 16 bit

More information

Microkernels, virtualization, exokernels. Tutorial 1 CSC469

Microkernels, virtualization, exokernels. Tutorial 1 CSC469 Microkernels, virtualization, exokernels Tutorial 1 CSC469 Monolithic kernel vs Microkernel Monolithic OS kernel Application VFS System call User mode What was the main idea? What were the problems? IPC,

More information

ARM Processors and the Internet of Things. Joseph Yiu Senior Embedded Technology Specialist, ARM

ARM Processors and the Internet of Things. Joseph Yiu Senior Embedded Technology Specialist, ARM ARM Processors and the Internet of Things Joseph Yiu Senior Embedded Technology Specialist, ARM 1 Internet of Things is a very Diverse Market Human interface Location aware MEMS sensors Smart homes Security,

More information

What is a System on a Chip?

What is a System on a Chip? What is a System on a Chip? Integration of a complete system, that until recently consisted of multiple ICs, onto a single IC. CPU PCI DSP SRAM ROM MPEG SoC DRAM System Chips Why? Characteristics: Complex

More information

IOMMU: A Detailed view

IOMMU: A Detailed view 12/1/14 Security Level: Security Level: IOMMU: A Detailed view Anurup M. Sanil Kumar D. Nov, 2014 HUAWEI TECHNOLOGIES CO., LTD. Contents n IOMMU Introduction n IOMMU for ARM n Use cases n Software Architecture

More information

Hardware Based Virtualization Technologies. Elsie Wahlig [email protected] Platform Software Architect

Hardware Based Virtualization Technologies. Elsie Wahlig elsie.wahlig@amd.com Platform Software Architect Hardware Based Virtualization Technologies Elsie Wahlig [email protected] Platform Software Architect Outline What is Virtualization? Evolution of Virtualization AMD Virtualization AMD s IO Virtualization

More information

Computer and Set of Robots

Computer and Set of Robots Lesson 11:DESIGN PROCESS EXAMPLES Mobile-Phone, Mobile- Computer and Set of Robots 1 Mobile Phone 2 Mobile phone SoC (System-on-Chip) Hardware units Microcontroller or ASIP (Application Specific Instruction

More information

7a. System-on-chip design and prototyping platforms

7a. System-on-chip design and prototyping platforms 7a. System-on-chip design and prototyping platforms Labros Bisdounis, Ph.D. Department of Computer and Communication Engineering 1 What is System-on-Chip (SoC)? System-on-chip is an integrated circuit

More information

M-Shield mobile security technology

M-Shield mobile security technology Technology for Innovators TM M-Shield mobile security technology making wireless secure Overview As 3G networks are successfully deployed worldwide, opportunities are arising to deliver to end-users a

More information

The ARM Architecture. With a focus on v7a and Cortex-A8

The ARM Architecture. With a focus on v7a and Cortex-A8 The ARM Architecture With a focus on v7a and Cortex-A8 1 Agenda Introduction to ARM Ltd ARM Processors Overview ARM v7a Architecture/Programmers Model Cortex-A8 Memory Management Cortex-A8 Pipeline 2 ARM

More information

Real-Time Operating Systems for MPSoCs

Real-Time Operating Systems for MPSoCs Real-Time Operating Systems for MPSoCs Hiroyuki Tomiyama Graduate School of Information Science Nagoya University http://member.acm.org/~hiroyuki MPSoC 2009 1 Contributors Hiroaki Takada Director and Professor

More information

SOC architecture and design

SOC architecture and design SOC architecture and design system-on-chip (SOC) processors: become components in a system SOC covers many topics processor: pipelined, superscalar, VLIW, array, vector storage: cache, embedded and external

More information

COS 318: Operating Systems. Virtual Machine Monitors

COS 318: Operating Systems. Virtual Machine Monitors COS 318: Operating Systems Virtual Machine Monitors Kai Li and Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall13/cos318/ Introduction u Have

More information

Virtual Machine Security

Virtual Machine Security Virtual Machine Security CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/ 1 Operating System Quandary Q: What is the primary goal

More information

VtRES 2013. Towards Hardware Embedded Virtualization Technology: Architectural Enhancements to an ARM SoC. ESRG Embedded Systems Research Group

VtRES 2013. Towards Hardware Embedded Virtualization Technology: Architectural Enhancements to an ARM SoC. ESRG Embedded Systems Research Group Towards Hardware Embedded Virtualization Technology: Architectural Enhancements to an ARM SoC VtRES 2013 P. Garcia, T. Gomes, F. Salgado, J. Monteiro, A. Tavares Summary 1. Current landscape in 2. Embedded

More information

ARM Webinar series. ARM Based SoC. Abey Thomas

ARM Webinar series. ARM Based SoC. Abey Thomas ARM Webinar series ARM Based SoC Verification Abey Thomas Agenda About ARM and ARM IP ARM based SoC Verification challenges Verification planning and strategy IP Connectivity verification Performance verification

More information

Lesson 7: SYSTEM-ON. SoC) AND USE OF VLSI CIRCUIT DESIGN TECHNOLOGY. Chapter-1L07: "Embedded Systems - ", Raj Kamal, Publs.: McGraw-Hill Education

Lesson 7: SYSTEM-ON. SoC) AND USE OF VLSI CIRCUIT DESIGN TECHNOLOGY. Chapter-1L07: Embedded Systems - , Raj Kamal, Publs.: McGraw-Hill Education Lesson 7: SYSTEM-ON ON-CHIP (SoC( SoC) AND USE OF VLSI CIRCUIT DESIGN TECHNOLOGY 1 VLSI chip Integration of high-level components Possess gate-level sophistication in circuits above that of the counter,

More information

Ways to Use USB in Embedded Systems

Ways to Use USB in Embedded Systems Ways to Use USB in Embedded Systems by Yingbo Hu, R&D Embedded Engineer and Ralph Moore, President of Micro Digital Universal Serial Bus (USB) is a connectivity specification that provides ease of use,

More information

Università Degli Studi di Parma. Distributed Systems Group. Android Development. Lecture 1 Android SDK & Development Environment. Marco Picone - 2012

Università Degli Studi di Parma. Distributed Systems Group. Android Development. Lecture 1 Android SDK & Development Environment. Marco Picone - 2012 Android Development Lecture 1 Android SDK & Development Environment Università Degli Studi di Parma Lecture Summary - 2 The Android Platform Android Environment Setup SDK Eclipse & ADT SDK Manager Android

More information

Full and Para Virtualization

Full and Para Virtualization Full and Para Virtualization Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF x86 Hardware Virtualization The x86 architecture offers four levels

More information

Java and Real Time Storage Applications

Java and Real Time Storage Applications Java and Real Time Storage Applications Gary Mueller Janet Borzuchowski 1 Flavors of Java for Embedded Systems Software Java Virtual Machine(JVM) Compiled Java Hardware Java Virtual Machine Java Virtual

More information

ARM Architecture. ARM history. Why ARM? ARM Ltd. 1983 developed by Acorn computers. Computer Organization and Assembly Languages Yung-Yu Chuang

ARM Architecture. ARM history. Why ARM? ARM Ltd. 1983 developed by Acorn computers. Computer Organization and Assembly Languages Yung-Yu Chuang ARM history ARM Architecture Computer Organization and Assembly Languages g Yung-Yu Chuang 1983 developed by Acorn computers To replace 6502 in BBC computers 4-man VLSI design team Its simplicity it comes

More information

Axis Technologies Computer Hardware and Electronics Portfolio Categories

Axis Technologies Computer Hardware and Electronics Portfolio Categories Axis Technologies Computer Hardware and Electronics Portfolio Categories SEPTEMBER 2008 Barebone Accessories Barebone Systems Media Center Barebone Systems Mini / Booksize Barebone Systems Bluetooth Headsets

More information

A case study of mobile SoC architecture design based on transaction-level modeling

A case study of mobile SoC architecture design based on transaction-level modeling A case study of mobile SoC architecture design based on transaction-level modeling Eui-Young Chung School of Electrical & Electronic Eng. Yonsei University 1 EUI-YOUNG(EY) CHUNG, EY CHUNG Outline Introduction

More information

WIND RIVER SECURE ANDROID CAPABILITY

WIND RIVER SECURE ANDROID CAPABILITY WIND RIVER SECURE ANDROID CAPABILITY Cyber warfare has swiftly migrated from hacking into enterprise networks and the Internet to targeting, and being triggered from, mobile devices. With the recent explosion

More information

Architecture (SOSP 2011) 11/11/2011 Minsung Jang

Architecture (SOSP 2011) 11/11/2011 Minsung Jang Cells: A Virtual Mobile Smartphone Architecture (SOSP 2011) Lunch TimeReading Group 11/11/2011 Minsung Jang Summary Novel Architecture for a Virtual Phone How to do away with overhead New way to virtualize

More information

Make the green IP switch Low-energy semiconductor solutions for VoIP

Make the green IP switch Low-energy semiconductor solutions for VoIP Make the green IP switch Low-energy semiconductor solutions for VoIP Greener, better, easier With its capability to deliver free calls, extra features and low infrastructure costs, Voice over Internet

More information

Network connectivity controllers

Network connectivity controllers Network connectivity controllers High performance connectivity solutions Factory Automation The hostile environment of many factories can have a significant impact on the life expectancy of PCs, and industrially

More information

Applied Micro development platform. ZT Systems (ST based) HP Redstone platform. Mitac Dell Copper platform. ARM in Servers

Applied Micro development platform. ZT Systems (ST based) HP Redstone platform. Mitac Dell Copper platform. ARM in Servers ZT Systems (ST based) Applied Micro development platform HP Redstone platform Mitac Dell Copper platform ARM in Servers 1 Server Ecosystem Momentum 2009: Internal ARM trials hosting part of website on

More information

Lesson 10:DESIGN PROCESS EXAMPLES Automatic Chocolate vending machine, smart card and digital camera

Lesson 10:DESIGN PROCESS EXAMPLES Automatic Chocolate vending machine, smart card and digital camera Lesson 10:DESIGN PROCESS EXAMPLES Automatic Chocolate vending machine, smart card and digital camera 1 Automatic Chocolate Vending Machine (ACVM) 2 Diagrammatic representation of ACVM Keypad for user Interface

More information

Virtualization: Hypervisors for Embedded and Safe Systems. Hanspeter Vogel Triadem Solutions AG

Virtualization: Hypervisors for Embedded and Safe Systems. Hanspeter Vogel Triadem Solutions AG 1 Virtualization: Hypervisors for Embedded and Safe Systems Hanspeter Vogel Triadem Solutions AG 2 Agenda Use cases for virtualization Terminology Hypervisor Solutions Realtime System Hypervisor Features

More information

Multi-core Programming System Overview

Multi-core Programming System Overview Multi-core Programming System Overview Based on slides from Intel Software College and Multi-Core Programming increasing performance through software multi-threading by Shameem Akhter and Jason Roberts,

More information

COS 318: Operating Systems

COS 318: Operating Systems COS 318: Operating Systems OS Structures and System Calls Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall10/cos318/ Outline Protection mechanisms

More information

Mobile Devices and Systems Lesson 02 Handheld Pocket Computers and Mobile System Operating Systems

Mobile Devices and Systems Lesson 02 Handheld Pocket Computers and Mobile System Operating Systems Mobile Devices and Systems Lesson 02 Handheld Pocket Computers and Mobile System Operating Systems Oxford University Press 2007. All rights reserved. 1 Handheld Pocket Computers Come in many manifestations

More information

DOWNLOAD COURSE PRESENTATIONS. Scan to download course presentations

DOWNLOAD COURSE PRESENTATIONS. Scan to download course presentations DOWNLOAD COURSE PRESENTATIONS 2 Scan to download course presentations ZYNQ OS SUPPORT 3 AGENDA 4 > OS/Ecosystem Overview > Xilinx Petalinux/OSL > AMP Reference Design Information > Linux Partial Reconfiguration

More information

Comprehensive Security for Internet-of-Things Devices With ARM TrustZone

Comprehensive Security for Internet-of-Things Devices With ARM TrustZone Comprehensive Security for Internet-of-Things Devices With ARM TrustZone Howard Williams mentor.com/embedded Internet-of-Things Trends The world is more connected IoT devices are smarter and more complex

More information

A Study on Anatomy of Smartphone

A Study on Anatomy of Smartphone Computer Communication & Collaboration (2013) Submitted on 27/May/2013 DOIC: 2292-1036-2013-01-024-08 A Study on Anatomy of Smartphone Muhammad Shiraz(Corresponding Author), Md Whaiduzzaman, Abdullah Gani

More information

CELLS A Virtual Mobile Smartphone Architecture

CELLS A Virtual Mobile Smartphone Architecture CELLS A Virtual Mobile Smartphone Architecture Jeremy Andrus, Christoffer Dall, Alexander Van t Hof, Oren Laadan, Jason Nieh Columbia University 23rd ACM Symposium on Operating Systems Principles, Cascais,

More information

Virtualization for Hard Real-Time Applications Partition where you can Virtualize where you have to

Virtualization for Hard Real-Time Applications Partition where you can Virtualize where you have to Virtualization for Hard Real-Time Applications Partition where you can Virtualize where you have to Hanspeter Vogel Triadem Solutions AG Real-Time Systems GmbH Gartenstrasse 33 D-88212 Ravensburg Germany

More information

Architectures, Processors, and Devices

Architectures, Processors, and Devices Architectures, Processors, and Devices Development Article Copyright 2009 ARM Limited. All rights reserved. ARM DHT 0001A Development Article Copyright 2009 ARM Limited. All rights reserved. Release Information

More information

Stefan Schmidt. [email protected]. LinuxTag 2008-05-28

Stefan Schmidt. stefan@openezx.org. LinuxTag 2008-05-28 mobile mobile LinuxTag 2008-05-28 mobile has been selling Linux smart in Asia for a long time They started selling the A780 in Europe end of 2005. Unfortunately they stopped in 2006 In october 2005 Harald

More information

Embedded Development Tools

Embedded Development Tools Embedded Development Tools Software Development Tools by ARM ARM tools enable developers to get the best from their ARM technology-based systems. Whether implementing an ARM processor-based SoC, writing

More information

Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor?

Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor? Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor? Mr. Jacob Torrey February 26, 2014 Dartmouth College 153 Brooks Road, Rome, NY 315.336.3306 http://ainfosec.com @JacobTorrey

More information

Performance tuning Xen

Performance tuning Xen Performance tuning Xen Roger Pau Monné [email protected] Madrid 8th of November, 2013 Xen Architecture Control Domain NetBSD or Linux device model (qemu) Hardware Drivers toolstack netback blkback Paravirtualized

More information

ELEC 5260/6260/6266 Embedded Computing Systems

ELEC 5260/6260/6266 Embedded Computing Systems ELEC 5260/6260/6266 Embedded Computing Systems Spring 2016 Victor P. Nelson Text: Computers as Components, 3 rd Edition Prof. Marilyn Wolf (Georgia Tech) Course Topics Embedded system design & modeling

More information

ARM TrustZone and KVM Coexistence with RTOS For Automotive

ARM TrustZone and KVM Coexistence with RTOS For Automotive ARM TrustZone and KVM Coexistence with RTOS For Automotive Michele Paolino [email protected] Automotive-grade Linux Summit, 2015-06-01, Tokyo, Japan Authorship and sponsorship Michele Paolino,

More information

What marketing won t tell you about the Internet of Things

What marketing won t tell you about the Internet of Things What marketing won t tell you about the Internet of Things Elecia White #eelive Produced by EE Times Why are you here? Why am I here? Founder of Logical Elegance, embedded systems consulting firm Author

More information

Which ARM Cortex Core Is Right for Your Application: A, R or M?

Which ARM Cortex Core Is Right for Your Application: A, R or M? Which ARM Cortex Core Is Right for Your Application: A, R or M? Introduction The ARM Cortex series of cores encompasses a very wide range of scalable performance options offering designers a great deal

More information

Virtualization for Cloud Computing

Virtualization for Cloud Computing Virtualization for Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF CLOUD COMPUTING On demand provision of computational resources

More information

ARM Security Technology

ARM Security Technology ARM Security Technology Building a Secure System using TrustZone Technology Copyright 2005-2009 ARM Limited. All rights reserved. PRD29-GENC-009492C ARM Security Technology Building a Secure System using

More information

Texas Instruments OMAP platform optimized for Microsoft Windows Mobile -based devices

Texas Instruments OMAP platform optimized for Microsoft Windows Mobile -based devices Technology for Innovators TM Texas Instruments OMAP platform optimized for Microsoft Windows Mobile -based devices Texas Instruments (TI) OMAP platform delivers a comprehensive family of reference designs,

More information

KVM: A Hypervisor for All Seasons. Avi Kivity [email protected]

KVM: A Hypervisor for All Seasons. Avi Kivity avi@qumranet.com KVM: A Hypervisor for All Seasons Avi Kivity [email protected] November 2007 Virtualization Simulation of computer system in software Components Processor: register state, instructions, exceptions Memory

More information

Topic 5a Operating System Fundamentals

Topic 5a Operating System Fundamentals Topic 5a Operating System Fundamentals What is an operating system? a computer is comprised of various types of software device drivers (storage, I/O, etc.) process and control software memory management

More information

Embedded Systems on ARM Cortex-M3 (4weeks/45hrs)

Embedded Systems on ARM Cortex-M3 (4weeks/45hrs) Embedded Systems on ARM Cortex-M3 (4weeks/45hrs) Course & Kit Contents LEARN HOW TO: Use of Keil Real View for ARM Use ARM Cortex-M3 MCU for professional embedded application development Understanding

More information

EEM870 Embedded System and Experiment Lecture 1: SoC Design Overview

EEM870 Embedded System and Experiment Lecture 1: SoC Design Overview EEM870 Embedded System and Experiment Lecture 1: SoC Design Overview Wen-Yen Lin, Ph.D. Department of Electrical Engineering Chang Gung University Email: [email protected] Feb. 2013 Course Overview

More information

VMware and CPU Virtualization Technology. Jack Lo Sr. Director, R&D

VMware and CPU Virtualization Technology. Jack Lo Sr. Director, R&D ware and CPU Virtualization Technology Jack Lo Sr. Director, R&D This presentation may contain ware confidential information. Copyright 2005 ware, Inc. All rights reserved. All other marks and names mentioned

More information

x86 ISA Modifications to support Virtual Machines

x86 ISA Modifications to support Virtual Machines x86 ISA Modifications to support Virtual Machines Douglas Beal Ashish Kumar Gupta CSE 548 Project Outline of the talk Review of Virtual Machines What complicates Virtualization Technique for Virtualization

More information

GETTING STARTED WITH ANDROID DEVELOPMENT FOR EMBEDDED SYSTEMS

GETTING STARTED WITH ANDROID DEVELOPMENT FOR EMBEDDED SYSTEMS Embedded Systems White Paper GETTING STARTED WITH ANDROID DEVELOPMENT FOR EMBEDDED SYSTEMS September 2009 ABSTRACT Android is an open source platform built by Google that includes an operating system,

More information

Friendly ARM MINI2440 & Dalvik Virtual Machine with Android

Friendly ARM MINI2440 & Dalvik Virtual Machine with Android e t International Journal on Emerging Technologies (Special Issue on NCRIET-2015) 6(2): 197-202(2015) ISSN No. (Print) : 0975-8364 ISSN No. (Online) : 2249-3255 Friendly ARM MINI2440 & Dalvik Virtual Machine

More information

BEAGLEBONE BLACK ARCHITECTURE MADELEINE DAIGNEAU MICHELLE ADVENA

BEAGLEBONE BLACK ARCHITECTURE MADELEINE DAIGNEAU MICHELLE ADVENA BEAGLEBONE BLACK ARCHITECTURE MADELEINE DAIGNEAU MICHELLE ADVENA AGENDA INTRO TO BEAGLEBONE BLACK HARDWARE & SPECS CORTEX-A8 ARMV7 PROCESSOR PROS & CONS VS RASPBERRY PI WHEN TO USE BEAGLEBONE BLACK Single

More information

Open Architecture Design for GPS Applications Yves Théroux, BAE Systems Canada

Open Architecture Design for GPS Applications Yves Théroux, BAE Systems Canada Open Architecture Design for GPS Applications Yves Théroux, BAE Systems Canada BIOGRAPHY Yves Théroux, a Project Engineer with BAE Systems Canada (BSC) has eight years of experience in the design, qualification,

More information

Mobile System Technologies Certification Program

Mobile System Technologies Certification Program Mobile System Technologies Certification Program This is the Mobile Computing Promotion Consortium s (MCPC) official certification program for engineers who wish to obtain deeper knowledge of and experience

More information

www.see-grid-sci.eu Regional SEE-GRID-SCI Training for Site Administrators Institute of Physics Belgrade March 5-6, 2009

www.see-grid-sci.eu Regional SEE-GRID-SCI Training for Site Administrators Institute of Physics Belgrade March 5-6, 2009 SEE-GRID-SCI Virtualization and Grid Computing with XEN www.see-grid-sci.eu Regional SEE-GRID-SCI Training for Site Administrators Institute of Physics Belgrade March 5-6, 2009 Milan Potocnik University

More information

Virtualization. Clothing the Wolf in Wool. Wednesday, April 17, 13

Virtualization. Clothing the Wolf in Wool. Wednesday, April 17, 13 Virtualization Clothing the Wolf in Wool Virtual Machines Began in 1960s with IBM and MIT Project MAC Also called open shop operating systems Present user with the view of a bare machine Execute most instructions

More information

Android Development. Lecture AD 0 Android SDK & Development Environment. Università degli Studi di Parma. Mobile Application Development

Android Development. Lecture AD 0 Android SDK & Development Environment. Università degli Studi di Parma. Mobile Application Development Android Development Lecture AD 0 Android SDK & Development Environment 2013/2014 Parma Università degli Studi di Parma Lecture Summary Android Module Overview The Android Platform Android Environment Setup

More information

Distributed Systems. Virtualization. Paul Krzyzanowski [email protected]

Distributed Systems. Virtualization. Paul Krzyzanowski pxk@cs.rutgers.edu Distributed Systems Virtualization Paul Krzyzanowski [email protected] Except as otherwise noted, the content of this presentation is licensed under the Creative Commons Attribution 2.5 License. Virtualization

More information

Architectures and Platforms

Architectures and Platforms Hardware/Software Codesign Arch&Platf. - 1 Architectures and Platforms 1. Architecture Selection: The Basic Trade-Offs 2. General Purpose vs. Application-Specific Processors 3. Processor Specialisation

More information

Processor Architectures

Processor Architectures ECPE 170 Jeff Shafer University of the Pacific Processor Architectures 2 Schedule Exam 3 Tuesday, December 6 th Caches Virtual Memory Input / Output OperaKng Systems Compilers & Assemblers Processor Architecture

More information

Make the green IP switch Low-energy semiconductor solutions for VoIP

Make the green IP switch Low-energy semiconductor solutions for VoIP Make the green IP switch Low-energy semiconductor solutions for VoIP 2011 Greener, better, easier With the promise of free calls, extra features and low infrastructure costs, Voice over Internet Protocol

More information

Reminders. Lab opens from today. Many students want to use the extra I/O pins on

Reminders. Lab opens from today. Many students want to use the extra I/O pins on Reminders Lab opens from today Wednesday 4:00-5:30pm, Friday 1:00-2:30pm Location: MK228 Each student checks out one sensor mote for your Lab 1 The TA will be there to help your lab work Many students

More information

ZigBee Technology Overview

ZigBee Technology Overview ZigBee Technology Overview Presented by Silicon Laboratories Shaoxian Luo 1 EM351 & EM357 introduction EM358x Family introduction 2 EM351 & EM357 3 Ember ZigBee Platform Complete, ready for certification

More information

Knut Omang Ifi/Oracle 19 Oct, 2015

Knut Omang Ifi/Oracle 19 Oct, 2015 Software and hardware support for Network Virtualization Knut Omang Ifi/Oracle 19 Oct, 2015 Motivation Goal: Introduction to challenges in providing fast networking to virtual machines Prerequisites: What

More information

The MIPS architecture and virtualization

The MIPS architecture and virtualization The MIPS architecture and virtualization Simply put, virtualization makes one physical device appear as one or more virtual devices. Virtualization can be implemented at the processor level (e.g. CPU or

More information

Last Class: OS and Computer Architecture. Last Class: OS and Computer Architecture

Last Class: OS and Computer Architecture. Last Class: OS and Computer Architecture Last Class: OS and Computer Architecture System bus Network card CPU, memory, I/O devices, network card, system bus Lecture 3, page 1 Last Class: OS and Computer Architecture OS Service Protection Interrupts

More information

User-Centric Mobile Cloud Device - Global Evolution from Mobile Era to Personal Era

User-Centric Mobile Cloud Device - Global Evolution from Mobile Era to Personal Era Prof. Willie W. Lu, Ph.D Chief Architect & Chief Inventor Open Wireless Architecture (OWA) and Mobile Cloud IPs Prof. Willie Lu, [email protected] User-Centric Mobile Cloud Device - Global Evolution from Mobile

More information

Uses for Virtual Machines. Virtual Machines. There are several uses for virtual machines:

Uses for Virtual Machines. Virtual Machines. There are several uses for virtual machines: Virtual Machines Uses for Virtual Machines Virtual machine technology, often just called virtualization, makes one computer behave as several computers by sharing the resources of a single computer between

More information

The Case for Device Namespaces

The Case for Device Namespaces The Case for Device Namespaces Oren Laadan September 18, 2013 www.cellrox.com aprilzosia Device Namespaces Roots Based on research at Columbia University: Cells: A Virtual Mobile Smartphone Architecture

More information

Virtualization. Dr. Yingwu Zhu

Virtualization. Dr. Yingwu Zhu Virtualization Dr. Yingwu Zhu What is virtualization? Virtualization allows one computer to do the job of multiple computers. Virtual environments let one computer host multiple operating systems at the

More information

ANDROID OPERATING SYSTEM

ANDROID OPERATING SYSTEM ANDROID OPERATING SYSTEM Himanshi Grover,Devesh Agrawal IT Department, Dronacharya College Of Engg Gurgaon,Haryana,India Abstract - Android has become need rather than luxury these days. The computing

More information

big.little Technology Moves Towards Fully Heterogeneous Global Task Scheduling Improving Energy Efficiency and Performance in Mobile Devices

big.little Technology Moves Towards Fully Heterogeneous Global Task Scheduling Improving Energy Efficiency and Performance in Mobile Devices big.little Technology Moves Towards Fully Heterogeneous Global Task Scheduling Improving Energy Efficiency and Performance in Mobile Devices Brian Jeff November, 2013 Abstract ARM big.little processing

More information

Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University

Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University Virtual Machine Monitors Dr. Marc E. Fiuczynski Research Scholar Princeton University Introduction Have been around since 1960 s on mainframes used for multitasking Good example VM/370 Have resurfaced

More information

Chapter 16: Virtual Machines. Operating System Concepts 9 th Edition

Chapter 16: Virtual Machines. Operating System Concepts 9 th Edition Chapter 16: Virtual Machines Silberschatz, Galvin and Gagne 2013 Chapter 16: Virtual Machines Overview History Benefits and Features Building Blocks Types of Virtual Machines and Their Implementations

More information

Virtualization. Jia Rao Assistant Professor in CS http://cs.uccs.edu/~jrao/

Virtualization. Jia Rao Assistant Professor in CS http://cs.uccs.edu/~jrao/ Virtualization Jia Rao Assistant Professor in CS http://cs.uccs.edu/~jrao/ What is Virtualization? Virtualization is the simulation of the software and/ or hardware upon which other software runs. This

More information

Understand and Build Android Programming Environment. Presented by: Che-Wei Chang

Understand and Build Android Programming Environment. Presented by: Che-Wei Chang Real Time System Project 1 Understand and Build Android Programming Environment Advisor: Prof. Tei-Wei i Kuo Presented by: Che-Wei Chang Outline Introduction to Android Framework What is Android Android

More information

Virtualization Technology

Virtualization Technology Virtualization Technology A Manifold Arms Race Michael H. Warfield Senior Researcher and Analyst [email protected] 2008 IBM Corporation Food for Thought Is Virtual Reality an oxymoron or is it the

More information