CSE597a - Cell Phone OS Security. Cellphone Hardware. William Enck Prof. Patrick McDaniel
|
|
|
- Jeremy Hicks
- 10 years ago
- Views:
Transcription
1 CSE597a - Cell Phone OS Security Cellphone Hardware William Enck Prof. Patrick McDaniel CSE597a - Cellular Phone Operating Systems Security - Spring Instructors McDaniel and Enck 1
2 2 Embedded Systems Embedded systems consist of many small components put together to comprise the system. Frequenly contain many microcontrollers and mini-oses. Embedded systems design is a trade-off between performance, size, and cost. Performance comes in many flavors, e.g., processing and power consumption Frequently, performance is sacrificed for smaller and cheaper devices Small variations in price are significant at large volumes Smartphones are upper scale embedded devices, but they are still embedded systems, and subject to many such constraints
3 3 Handset Architecture Most mobile handsets comprise of two main processors (baseband and application) and peripheral-specific logic cores Commonly, a System-on-Chip (SoC) for the application processor and peripheral-specific logic. Sometimes the baseband processor is included on that SoC SoC means more efficient data transfers and lower exposure to potential physical attackers Camera Apps Bluetooth GPS Display Keyboard Middleware RIL OS Kernel App Processor AT cmds serial, UART, shared memory Baseband radio stack Baseband processor Modem Rx/Tx SIM Card
4 4 Peripherals Consumers choose devices based on functionality. Frequently, this includes hardware peripherals Standard peripherals: display, keyboard (or touchscreen), microphone, speaker (w/ headset), camera (more pixels is better) Emerging standard peripherals: GPS, accelerometer, compass, video acceleration, graphics acceleration, FM radio Functional Block Diagram for TI OMAP3530
5 5 Location Services GPS navigation devices are common in vehicles. A conventional GPS devices uses measurements ([x,y,z,t]) from four satellites. In certain cases, the fourth satellite used to update clock. GPS has problems while indoor or around tall buildings. This is fine when driving on the freeway, but bad in cities, and bad for phones More common in mobile phones is Assisted-GPS (A-GPS) Location of cell site (also useful without GPS) Compare fragments from phones Supply satellite positions Error correcting information (ionospheric conditions) Offload work to assistance server
6 6 Modem Processor Voice and data communications processing is intensive. For realtime and security reasons, a separate baseband processor and OS exist (no need for RTOS or preemption for App OS). More and more frequently, the broadband (aka modem or communications) processor is located on the same silicon chip as the application and peripheral logic. Separate ARM core (DSP extensions) and sometimes modem accelerators. Broadcom BCM2153
7 7 Application Processor The application processor runs the operating system that interacts with the user... consumer focus The phone is becoming a general purpose computing device New phones support full featured operating systems based on Linux, Mac OS X, and Windows Hardware includes MMU, DMA, multi-gb storage, etc... however, handsets are still embedded systems and require many optimizations for the constrained environment Sometimes like a clown on a tiny tricycle...
8 8 ARM Architecture Almost all mobile phones use an ARM-based processor ARM based processors are very common in embedded systems. For example, Game Boy Advance, Nintendo DS, and ipod use an ARMv4T processor. Many smartphones use ARMv5 or ARMv6 architectures. Naming is a big mess: Family vs. Architecture vs. core. Example, iphone uses ARM11 family, ARMv6KZ architecture, and ARM1176JZ(F)-S core (which has SIMD, Jazelle DBZ, and TrustZone...) ARM Ltd. doesn t actually sell hardware chips Licenses Intellectual Property (IP) to merchant foundries for chip (SoC) designs Long history of low transistor count: ARM2 was 30,000 transistors when Motorola was around 70,000 (6 year older design)
9 9 Jazelle DBX Many embedded devices use Java (this is Java s origin), therefore, some ARM cores include the Jazelle DBX technology Direct Bytecode execution (DBX) First introduced in the ARM926EJ-S core (ARMv5TEJ architecture) A Jazelle-aware Java virtual machine can branch (BXJ) to Java bytecode Incomplete set of specifications published (allows OS to run Jazelle-aware JVM, but not enough information to the JVM)
10 10 Memory Protection MMU and protection varies between families and architectures... however, let s look at the ARM1176JZF-S Processes are either user or privileged (multiple privileged) Memory regions grouped into domains ; access permissions specified at the domain level Domains accessed as either a client or manager identified by system register (allows fast switching w/out TLB flush) Access determined by AP[1:0] and APX bits in page table (and TLB). They cause different R/W behavior depending if user or privileged Execute Never (XN) bit restricts page execution Additional protection provided by TrustZone...
11 11 ARM TrustZone TrustZone provides a processor abstraction providing two virtual CPUs that execute on one physical CPU. This defines a normal world and a secure world. The secure OS is often used less frequently. We want the isolation, but don t want to waste chip real estate. TrustZone is typically only a 5% area overhead Virtual CPUs also allow fast and efficient (speed, power) data transfers Included in ARM1176JZ(F)-S (good for documentation) (from ARM1176JZF-S Documentation)
12 12 Why TrustZone? The Secure OS can perform tasks such as protect access to keys (SIM lock functionality) or DRM (decode music). It allows arbitrary secure services to be defined with client stubs (using TrustZone API) in normal OS. Also protects security sensitive hardware (e.g., secure storage) SoC provides many security advantages. Of most note is the inability to place a reader on data lines (or at least much harder). Security state is propagated on the SoC bus
13 13 Memory Address Spaces TrustZone adds the Non Secure (NS) bit to the address space {NS, address[31:0]} {1,0xFFFFFFFF} {1,0x } {0,0xFFFFFFFF} {0,0x } Normal World Operation Peripherals (OS and Apps) Normal page tables Normal vectors Not accessible Secure World Operation Peripherals (OS and Apps) Normal page tables Normal vectors Peripherals (OS and Apps) Secure page tables Secure vectors
14 14 Secure Bus via ARM AXI On memory access, CPU security state provided on bus Use ARM s AXI (AMBA Extended Interface) Two bits: awprot[1] (write) and arprot[1] (read) Low = secure; high = nonsecure (just like NS bit) If a secure device (e.g., co-processor) on the bus is access when the processor is in nonsecure mode, it can detect the state and return peripheral does not exist at this address error E.g., crypto key in register
15 Mode Switching There are three basic modes that a TrustZone enhanced CPU can be put into: normal, secure, and monitor. The normal OS initiates a change into the secure OS via an exception model, e.g., the explicit secure monitor call (SMC). This puts the CPU in monitor mode, which stores the normal OS CPU registers, restores secure OS CPU registers, and branches to the secure OS. A similar process occurs in reverse. Each mode has it s own vector table. The monitor mode vector table can be to automatically override vector entries in normal and secure worlds Note: The monitor is a small OS in of itself (must be developed) CSE597a - Cellular Phone Operating Systems Security - Spring Instructors McDaniel and Enck Priv Mode SMC User Mode Normal World Monitor Priv Mode User Mode Secure World 15
16 16 TrustZone for Virtualization You may have noticed that the monitor OS acts as a limited hypervisor to switch between the normal and secure worlds However, the TrustZone model allows normal world OS to schedule secure world... but this need not be the case Recall that 1) the monitor stores and restores registers and 2) the monitor s vector table can override normal vectors This can give us an architecture similar to Xen (work being done at Samsung) Secure world OS acts as dom0 Monitor switches between multiple guest normal world OSes Do we gain anything over Xen w/out TrustZone?
17 17 TrustZone Software The TrustZone software suite provides secure service and client APIs. Along with cryptography and secure storage facilities for use by services Client API includes secure channel driver operates similar to DMA and controls secure world scheduling Software API allows new services to be created (type-safe API) e.g., for DRM or SIM-locking Native services in SSDI Java services in STIP (Small Terminal Interoperability Platform API), which includes a byte-code verifier Limited public implementations (combined with TCG by Winter, STC 08)
Hardware accelerated Virtualization in the ARM Cortex Processors
Hardware accelerated Virtualization in the ARM Cortex Processors John Goodacre Director, Program Management ARM Processor Division ARM Ltd. Cambridge UK 2nd November 2010 Sponsored by: & & New Capabilities
ARM Microprocessor and ARM-Based Microcontrollers
ARM Microprocessor and ARM-Based Microcontrollers Nguatem William 24th May 2006 A Microcontroller-Based Embedded System Roadmap 1 Introduction ARM ARM Basics 2 ARM Extensions Thumb Jazelle NEON & DSP Enhancement
The Future of the ARM Processor in Military Operations
The Future of the ARM Processor in Military Operations ARMs for the Armed Mike Anderson Chief Scientist The PTR Group, Inc. http://www.theptrgroup.com What We Will Talk About The ARM architecture ARM performance
Leveraging Thin Hypervisors for Security on Embedded Systems
Leveraging Thin Hypervisors for Security on Embedded Systems Christian Gehrmann A part of Swedish ICT What is virtualization? Separation of a resource or request for a service from the underlying physical
Virtualization in the ARMv7 Architecture Lecture for the Embedded Systems Course CSD, University of Crete (May 20, 2014)
Virtualization in the ARMv7 Architecture Lecture for the Embedded Systems Course CSD, University of Crete (May 20, 2014) ManolisMarazakis ([email protected]) Institute of Computer Science (ICS) Foundation
Sierraware Overview. Simply Secure
Sierraware Overview Simply Secure Sierraware Software Suite SierraTEE/Micro Kernel TrustZone/GlobalPlatform TEE SierraVisor: Bare Metal Hypervisor Hypervisor for ARM Para-virtualization, TrustZone Virtualization,
A Survey on ARM Cortex A Processors. Wei Wang Tanima Dey
A Survey on ARM Cortex A Processors Wei Wang Tanima Dey 1 Overview of ARM Processors Focusing on Cortex A9 & Cortex A15 ARM ships no processors but only IP cores For SoC integration Targeting markets:
Mobile Operating Systems. Week I
Mobile Operating Systems Week I Overview Introduction Mobile Operating System Structure Mobile Operating System Platforms Java ME Platform Palm OS Symbian OS Linux OS Windows Mobile OS BlackBerry OS iphone
Android Virtualization from Sierraware. Simply Secure
Android Virtualization from Sierraware Simply Secure Integration Challenges DRM Mandates TrustZone TEE Hypervisor provides the flexibility and security needed for BYOD Power management, responsibility
ADVANCED PROCESSOR ARCHITECTURES AND MEMORY ORGANISATION Lesson-12: ARM
ADVANCED PROCESSOR ARCHITECTURES AND MEMORY ORGANISATION Lesson-12: ARM 1 The ARM architecture processors popular in Mobile phone systems 2 ARM Features ARM has 32-bit architecture but supports 16 bit
Microkernels, virtualization, exokernels. Tutorial 1 CSC469
Microkernels, virtualization, exokernels Tutorial 1 CSC469 Monolithic kernel vs Microkernel Monolithic OS kernel Application VFS System call User mode What was the main idea? What were the problems? IPC,
ARM Processors and the Internet of Things. Joseph Yiu Senior Embedded Technology Specialist, ARM
ARM Processors and the Internet of Things Joseph Yiu Senior Embedded Technology Specialist, ARM 1 Internet of Things is a very Diverse Market Human interface Location aware MEMS sensors Smart homes Security,
What is a System on a Chip?
What is a System on a Chip? Integration of a complete system, that until recently consisted of multiple ICs, onto a single IC. CPU PCI DSP SRAM ROM MPEG SoC DRAM System Chips Why? Characteristics: Complex
IOMMU: A Detailed view
12/1/14 Security Level: Security Level: IOMMU: A Detailed view Anurup M. Sanil Kumar D. Nov, 2014 HUAWEI TECHNOLOGIES CO., LTD. Contents n IOMMU Introduction n IOMMU for ARM n Use cases n Software Architecture
Hardware Based Virtualization Technologies. Elsie Wahlig [email protected] Platform Software Architect
Hardware Based Virtualization Technologies Elsie Wahlig [email protected] Platform Software Architect Outline What is Virtualization? Evolution of Virtualization AMD Virtualization AMD s IO Virtualization
Computer and Set of Robots
Lesson 11:DESIGN PROCESS EXAMPLES Mobile-Phone, Mobile- Computer and Set of Robots 1 Mobile Phone 2 Mobile phone SoC (System-on-Chip) Hardware units Microcontroller or ASIP (Application Specific Instruction
7a. System-on-chip design and prototyping platforms
7a. System-on-chip design and prototyping platforms Labros Bisdounis, Ph.D. Department of Computer and Communication Engineering 1 What is System-on-Chip (SoC)? System-on-chip is an integrated circuit
M-Shield mobile security technology
Technology for Innovators TM M-Shield mobile security technology making wireless secure Overview As 3G networks are successfully deployed worldwide, opportunities are arising to deliver to end-users a
The ARM Architecture. With a focus on v7a and Cortex-A8
The ARM Architecture With a focus on v7a and Cortex-A8 1 Agenda Introduction to ARM Ltd ARM Processors Overview ARM v7a Architecture/Programmers Model Cortex-A8 Memory Management Cortex-A8 Pipeline 2 ARM
Real-Time Operating Systems for MPSoCs
Real-Time Operating Systems for MPSoCs Hiroyuki Tomiyama Graduate School of Information Science Nagoya University http://member.acm.org/~hiroyuki MPSoC 2009 1 Contributors Hiroaki Takada Director and Professor
SOC architecture and design
SOC architecture and design system-on-chip (SOC) processors: become components in a system SOC covers many topics processor: pipelined, superscalar, VLIW, array, vector storage: cache, embedded and external
COS 318: Operating Systems. Virtual Machine Monitors
COS 318: Operating Systems Virtual Machine Monitors Kai Li and Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall13/cos318/ Introduction u Have
Virtual Machine Security
Virtual Machine Security CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/ 1 Operating System Quandary Q: What is the primary goal
VtRES 2013. Towards Hardware Embedded Virtualization Technology: Architectural Enhancements to an ARM SoC. ESRG Embedded Systems Research Group
Towards Hardware Embedded Virtualization Technology: Architectural Enhancements to an ARM SoC VtRES 2013 P. Garcia, T. Gomes, F. Salgado, J. Monteiro, A. Tavares Summary 1. Current landscape in 2. Embedded
ARM Webinar series. ARM Based SoC. Abey Thomas
ARM Webinar series ARM Based SoC Verification Abey Thomas Agenda About ARM and ARM IP ARM based SoC Verification challenges Verification planning and strategy IP Connectivity verification Performance verification
Lesson 7: SYSTEM-ON. SoC) AND USE OF VLSI CIRCUIT DESIGN TECHNOLOGY. Chapter-1L07: "Embedded Systems - ", Raj Kamal, Publs.: McGraw-Hill Education
Lesson 7: SYSTEM-ON ON-CHIP (SoC( SoC) AND USE OF VLSI CIRCUIT DESIGN TECHNOLOGY 1 VLSI chip Integration of high-level components Possess gate-level sophistication in circuits above that of the counter,
Ways to Use USB in Embedded Systems
Ways to Use USB in Embedded Systems by Yingbo Hu, R&D Embedded Engineer and Ralph Moore, President of Micro Digital Universal Serial Bus (USB) is a connectivity specification that provides ease of use,
Università Degli Studi di Parma. Distributed Systems Group. Android Development. Lecture 1 Android SDK & Development Environment. Marco Picone - 2012
Android Development Lecture 1 Android SDK & Development Environment Università Degli Studi di Parma Lecture Summary - 2 The Android Platform Android Environment Setup SDK Eclipse & ADT SDK Manager Android
Full and Para Virtualization
Full and Para Virtualization Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF x86 Hardware Virtualization The x86 architecture offers four levels
Java and Real Time Storage Applications
Java and Real Time Storage Applications Gary Mueller Janet Borzuchowski 1 Flavors of Java for Embedded Systems Software Java Virtual Machine(JVM) Compiled Java Hardware Java Virtual Machine Java Virtual
ARM Architecture. ARM history. Why ARM? ARM Ltd. 1983 developed by Acorn computers. Computer Organization and Assembly Languages Yung-Yu Chuang
ARM history ARM Architecture Computer Organization and Assembly Languages g Yung-Yu Chuang 1983 developed by Acorn computers To replace 6502 in BBC computers 4-man VLSI design team Its simplicity it comes
Axis Technologies Computer Hardware and Electronics Portfolio Categories
Axis Technologies Computer Hardware and Electronics Portfolio Categories SEPTEMBER 2008 Barebone Accessories Barebone Systems Media Center Barebone Systems Mini / Booksize Barebone Systems Bluetooth Headsets
A case study of mobile SoC architecture design based on transaction-level modeling
A case study of mobile SoC architecture design based on transaction-level modeling Eui-Young Chung School of Electrical & Electronic Eng. Yonsei University 1 EUI-YOUNG(EY) CHUNG, EY CHUNG Outline Introduction
WIND RIVER SECURE ANDROID CAPABILITY
WIND RIVER SECURE ANDROID CAPABILITY Cyber warfare has swiftly migrated from hacking into enterprise networks and the Internet to targeting, and being triggered from, mobile devices. With the recent explosion
Architecture (SOSP 2011) 11/11/2011 Minsung Jang
Cells: A Virtual Mobile Smartphone Architecture (SOSP 2011) Lunch TimeReading Group 11/11/2011 Minsung Jang Summary Novel Architecture for a Virtual Phone How to do away with overhead New way to virtualize
Make the green IP switch Low-energy semiconductor solutions for VoIP
Make the green IP switch Low-energy semiconductor solutions for VoIP Greener, better, easier With its capability to deliver free calls, extra features and low infrastructure costs, Voice over Internet
Network connectivity controllers
Network connectivity controllers High performance connectivity solutions Factory Automation The hostile environment of many factories can have a significant impact on the life expectancy of PCs, and industrially
Applied Micro development platform. ZT Systems (ST based) HP Redstone platform. Mitac Dell Copper platform. ARM in Servers
ZT Systems (ST based) Applied Micro development platform HP Redstone platform Mitac Dell Copper platform ARM in Servers 1 Server Ecosystem Momentum 2009: Internal ARM trials hosting part of website on
Lesson 10:DESIGN PROCESS EXAMPLES Automatic Chocolate vending machine, smart card and digital camera
Lesson 10:DESIGN PROCESS EXAMPLES Automatic Chocolate vending machine, smart card and digital camera 1 Automatic Chocolate Vending Machine (ACVM) 2 Diagrammatic representation of ACVM Keypad for user Interface
Virtualization: Hypervisors for Embedded and Safe Systems. Hanspeter Vogel Triadem Solutions AG
1 Virtualization: Hypervisors for Embedded and Safe Systems Hanspeter Vogel Triadem Solutions AG 2 Agenda Use cases for virtualization Terminology Hypervisor Solutions Realtime System Hypervisor Features
Multi-core Programming System Overview
Multi-core Programming System Overview Based on slides from Intel Software College and Multi-Core Programming increasing performance through software multi-threading by Shameem Akhter and Jason Roberts,
COS 318: Operating Systems
COS 318: Operating Systems OS Structures and System Calls Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall10/cos318/ Outline Protection mechanisms
Mobile Devices and Systems Lesson 02 Handheld Pocket Computers and Mobile System Operating Systems
Mobile Devices and Systems Lesson 02 Handheld Pocket Computers and Mobile System Operating Systems Oxford University Press 2007. All rights reserved. 1 Handheld Pocket Computers Come in many manifestations
DOWNLOAD COURSE PRESENTATIONS. Scan to download course presentations
DOWNLOAD COURSE PRESENTATIONS 2 Scan to download course presentations ZYNQ OS SUPPORT 3 AGENDA 4 > OS/Ecosystem Overview > Xilinx Petalinux/OSL > AMP Reference Design Information > Linux Partial Reconfiguration
Comprehensive Security for Internet-of-Things Devices With ARM TrustZone
Comprehensive Security for Internet-of-Things Devices With ARM TrustZone Howard Williams mentor.com/embedded Internet-of-Things Trends The world is more connected IoT devices are smarter and more complex
A Study on Anatomy of Smartphone
Computer Communication & Collaboration (2013) Submitted on 27/May/2013 DOIC: 2292-1036-2013-01-024-08 A Study on Anatomy of Smartphone Muhammad Shiraz(Corresponding Author), Md Whaiduzzaman, Abdullah Gani
CELLS A Virtual Mobile Smartphone Architecture
CELLS A Virtual Mobile Smartphone Architecture Jeremy Andrus, Christoffer Dall, Alexander Van t Hof, Oren Laadan, Jason Nieh Columbia University 23rd ACM Symposium on Operating Systems Principles, Cascais,
Virtualization for Hard Real-Time Applications Partition where you can Virtualize where you have to
Virtualization for Hard Real-Time Applications Partition where you can Virtualize where you have to Hanspeter Vogel Triadem Solutions AG Real-Time Systems GmbH Gartenstrasse 33 D-88212 Ravensburg Germany
Architectures, Processors, and Devices
Architectures, Processors, and Devices Development Article Copyright 2009 ARM Limited. All rights reserved. ARM DHT 0001A Development Article Copyright 2009 ARM Limited. All rights reserved. Release Information
Stefan Schmidt. [email protected]. LinuxTag 2008-05-28
mobile mobile LinuxTag 2008-05-28 mobile has been selling Linux smart in Asia for a long time They started selling the A780 in Europe end of 2005. Unfortunately they stopped in 2006 In october 2005 Harald
Embedded Development Tools
Embedded Development Tools Software Development Tools by ARM ARM tools enable developers to get the best from their ARM technology-based systems. Whether implementing an ARM processor-based SoC, writing
Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor?
Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor? Mr. Jacob Torrey February 26, 2014 Dartmouth College 153 Brooks Road, Rome, NY 315.336.3306 http://ainfosec.com @JacobTorrey
Performance tuning Xen
Performance tuning Xen Roger Pau Monné [email protected] Madrid 8th of November, 2013 Xen Architecture Control Domain NetBSD or Linux device model (qemu) Hardware Drivers toolstack netback blkback Paravirtualized
ELEC 5260/6260/6266 Embedded Computing Systems
ELEC 5260/6260/6266 Embedded Computing Systems Spring 2016 Victor P. Nelson Text: Computers as Components, 3 rd Edition Prof. Marilyn Wolf (Georgia Tech) Course Topics Embedded system design & modeling
ARM TrustZone and KVM Coexistence with RTOS For Automotive
ARM TrustZone and KVM Coexistence with RTOS For Automotive Michele Paolino [email protected] Automotive-grade Linux Summit, 2015-06-01, Tokyo, Japan Authorship and sponsorship Michele Paolino,
What marketing won t tell you about the Internet of Things
What marketing won t tell you about the Internet of Things Elecia White #eelive Produced by EE Times Why are you here? Why am I here? Founder of Logical Elegance, embedded systems consulting firm Author
Which ARM Cortex Core Is Right for Your Application: A, R or M?
Which ARM Cortex Core Is Right for Your Application: A, R or M? Introduction The ARM Cortex series of cores encompasses a very wide range of scalable performance options offering designers a great deal
Virtualization for Cloud Computing
Virtualization for Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF CLOUD COMPUTING On demand provision of computational resources
ARM Security Technology
ARM Security Technology Building a Secure System using TrustZone Technology Copyright 2005-2009 ARM Limited. All rights reserved. PRD29-GENC-009492C ARM Security Technology Building a Secure System using
Texas Instruments OMAP platform optimized for Microsoft Windows Mobile -based devices
Technology for Innovators TM Texas Instruments OMAP platform optimized for Microsoft Windows Mobile -based devices Texas Instruments (TI) OMAP platform delivers a comprehensive family of reference designs,
KVM: A Hypervisor for All Seasons. Avi Kivity [email protected]
KVM: A Hypervisor for All Seasons Avi Kivity [email protected] November 2007 Virtualization Simulation of computer system in software Components Processor: register state, instructions, exceptions Memory
Topic 5a Operating System Fundamentals
Topic 5a Operating System Fundamentals What is an operating system? a computer is comprised of various types of software device drivers (storage, I/O, etc.) process and control software memory management
Embedded Systems on ARM Cortex-M3 (4weeks/45hrs)
Embedded Systems on ARM Cortex-M3 (4weeks/45hrs) Course & Kit Contents LEARN HOW TO: Use of Keil Real View for ARM Use ARM Cortex-M3 MCU for professional embedded application development Understanding
EEM870 Embedded System and Experiment Lecture 1: SoC Design Overview
EEM870 Embedded System and Experiment Lecture 1: SoC Design Overview Wen-Yen Lin, Ph.D. Department of Electrical Engineering Chang Gung University Email: [email protected] Feb. 2013 Course Overview
VMware and CPU Virtualization Technology. Jack Lo Sr. Director, R&D
ware and CPU Virtualization Technology Jack Lo Sr. Director, R&D This presentation may contain ware confidential information. Copyright 2005 ware, Inc. All rights reserved. All other marks and names mentioned
x86 ISA Modifications to support Virtual Machines
x86 ISA Modifications to support Virtual Machines Douglas Beal Ashish Kumar Gupta CSE 548 Project Outline of the talk Review of Virtual Machines What complicates Virtualization Technique for Virtualization
GETTING STARTED WITH ANDROID DEVELOPMENT FOR EMBEDDED SYSTEMS
Embedded Systems White Paper GETTING STARTED WITH ANDROID DEVELOPMENT FOR EMBEDDED SYSTEMS September 2009 ABSTRACT Android is an open source platform built by Google that includes an operating system,
Friendly ARM MINI2440 & Dalvik Virtual Machine with Android
e t International Journal on Emerging Technologies (Special Issue on NCRIET-2015) 6(2): 197-202(2015) ISSN No. (Print) : 0975-8364 ISSN No. (Online) : 2249-3255 Friendly ARM MINI2440 & Dalvik Virtual Machine
BEAGLEBONE BLACK ARCHITECTURE MADELEINE DAIGNEAU MICHELLE ADVENA
BEAGLEBONE BLACK ARCHITECTURE MADELEINE DAIGNEAU MICHELLE ADVENA AGENDA INTRO TO BEAGLEBONE BLACK HARDWARE & SPECS CORTEX-A8 ARMV7 PROCESSOR PROS & CONS VS RASPBERRY PI WHEN TO USE BEAGLEBONE BLACK Single
Open Architecture Design for GPS Applications Yves Théroux, BAE Systems Canada
Open Architecture Design for GPS Applications Yves Théroux, BAE Systems Canada BIOGRAPHY Yves Théroux, a Project Engineer with BAE Systems Canada (BSC) has eight years of experience in the design, qualification,
Mobile System Technologies Certification Program
Mobile System Technologies Certification Program This is the Mobile Computing Promotion Consortium s (MCPC) official certification program for engineers who wish to obtain deeper knowledge of and experience
www.see-grid-sci.eu Regional SEE-GRID-SCI Training for Site Administrators Institute of Physics Belgrade March 5-6, 2009
SEE-GRID-SCI Virtualization and Grid Computing with XEN www.see-grid-sci.eu Regional SEE-GRID-SCI Training for Site Administrators Institute of Physics Belgrade March 5-6, 2009 Milan Potocnik University
Virtualization. Clothing the Wolf in Wool. Wednesday, April 17, 13
Virtualization Clothing the Wolf in Wool Virtual Machines Began in 1960s with IBM and MIT Project MAC Also called open shop operating systems Present user with the view of a bare machine Execute most instructions
Android Development. Lecture AD 0 Android SDK & Development Environment. Università degli Studi di Parma. Mobile Application Development
Android Development Lecture AD 0 Android SDK & Development Environment 2013/2014 Parma Università degli Studi di Parma Lecture Summary Android Module Overview The Android Platform Android Environment Setup
Distributed Systems. Virtualization. Paul Krzyzanowski [email protected]
Distributed Systems Virtualization Paul Krzyzanowski [email protected] Except as otherwise noted, the content of this presentation is licensed under the Creative Commons Attribution 2.5 License. Virtualization
Architectures and Platforms
Hardware/Software Codesign Arch&Platf. - 1 Architectures and Platforms 1. Architecture Selection: The Basic Trade-Offs 2. General Purpose vs. Application-Specific Processors 3. Processor Specialisation
Processor Architectures
ECPE 170 Jeff Shafer University of the Pacific Processor Architectures 2 Schedule Exam 3 Tuesday, December 6 th Caches Virtual Memory Input / Output OperaKng Systems Compilers & Assemblers Processor Architecture
Make the green IP switch Low-energy semiconductor solutions for VoIP
Make the green IP switch Low-energy semiconductor solutions for VoIP 2011 Greener, better, easier With the promise of free calls, extra features and low infrastructure costs, Voice over Internet Protocol
Reminders. Lab opens from today. Many students want to use the extra I/O pins on
Reminders Lab opens from today Wednesday 4:00-5:30pm, Friday 1:00-2:30pm Location: MK228 Each student checks out one sensor mote for your Lab 1 The TA will be there to help your lab work Many students
ZigBee Technology Overview
ZigBee Technology Overview Presented by Silicon Laboratories Shaoxian Luo 1 EM351 & EM357 introduction EM358x Family introduction 2 EM351 & EM357 3 Ember ZigBee Platform Complete, ready for certification
Knut Omang Ifi/Oracle 19 Oct, 2015
Software and hardware support for Network Virtualization Knut Omang Ifi/Oracle 19 Oct, 2015 Motivation Goal: Introduction to challenges in providing fast networking to virtual machines Prerequisites: What
The MIPS architecture and virtualization
The MIPS architecture and virtualization Simply put, virtualization makes one physical device appear as one or more virtual devices. Virtualization can be implemented at the processor level (e.g. CPU or
Last Class: OS and Computer Architecture. Last Class: OS and Computer Architecture
Last Class: OS and Computer Architecture System bus Network card CPU, memory, I/O devices, network card, system bus Lecture 3, page 1 Last Class: OS and Computer Architecture OS Service Protection Interrupts
User-Centric Mobile Cloud Device - Global Evolution from Mobile Era to Personal Era
Prof. Willie W. Lu, Ph.D Chief Architect & Chief Inventor Open Wireless Architecture (OWA) and Mobile Cloud IPs Prof. Willie Lu, [email protected] User-Centric Mobile Cloud Device - Global Evolution from Mobile
Uses for Virtual Machines. Virtual Machines. There are several uses for virtual machines:
Virtual Machines Uses for Virtual Machines Virtual machine technology, often just called virtualization, makes one computer behave as several computers by sharing the resources of a single computer between
The Case for Device Namespaces
The Case for Device Namespaces Oren Laadan September 18, 2013 www.cellrox.com aprilzosia Device Namespaces Roots Based on research at Columbia University: Cells: A Virtual Mobile Smartphone Architecture
Virtualization. Dr. Yingwu Zhu
Virtualization Dr. Yingwu Zhu What is virtualization? Virtualization allows one computer to do the job of multiple computers. Virtual environments let one computer host multiple operating systems at the
ANDROID OPERATING SYSTEM
ANDROID OPERATING SYSTEM Himanshi Grover,Devesh Agrawal IT Department, Dronacharya College Of Engg Gurgaon,Haryana,India Abstract - Android has become need rather than luxury these days. The computing
big.little Technology Moves Towards Fully Heterogeneous Global Task Scheduling Improving Energy Efficiency and Performance in Mobile Devices
big.little Technology Moves Towards Fully Heterogeneous Global Task Scheduling Improving Energy Efficiency and Performance in Mobile Devices Brian Jeff November, 2013 Abstract ARM big.little processing
Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University
Virtual Machine Monitors Dr. Marc E. Fiuczynski Research Scholar Princeton University Introduction Have been around since 1960 s on mainframes used for multitasking Good example VM/370 Have resurfaced
Chapter 16: Virtual Machines. Operating System Concepts 9 th Edition
Chapter 16: Virtual Machines Silberschatz, Galvin and Gagne 2013 Chapter 16: Virtual Machines Overview History Benefits and Features Building Blocks Types of Virtual Machines and Their Implementations
Virtualization. Jia Rao Assistant Professor in CS http://cs.uccs.edu/~jrao/
Virtualization Jia Rao Assistant Professor in CS http://cs.uccs.edu/~jrao/ What is Virtualization? Virtualization is the simulation of the software and/ or hardware upon which other software runs. This
Understand and Build Android Programming Environment. Presented by: Che-Wei Chang
Real Time System Project 1 Understand and Build Android Programming Environment Advisor: Prof. Tei-Wei i Kuo Presented by: Che-Wei Chang Outline Introduction to Android Framework What is Android Android
Virtualization Technology
Virtualization Technology A Manifold Arms Race Michael H. Warfield Senior Researcher and Analyst [email protected] 2008 IBM Corporation Food for Thought Is Virtual Reality an oxymoron or is it the
