Please log in

Paper / Information search system

日本語

ENGLISH

Help

Please log in

  • Summary & Details

Mechanism for Runtime Kernel Integrity Check without Additional IP and without TEE for Low/Mid Automotive Segments

Detailed Information

Author(E)1) Shyju Thekkumbadan, 2) Sreedhar Reddy Pacharla, 3) Jipin Jose
Affiliation(E)1) Harman International India Pvt Ltd., 2) Harman International India Pvt Ltd., 3) Harman International India Pvt Ltd.
Abstract(E)Vehicles have more connectivity options now-a-days and these increasing connection options are giving more chances for an intruder to exploit the system. So, the vehicle manufacturers need to make the ECU in the vehicle more secure. To make the system secure, the embedded system must secure all the assets in the system. Examples of assets are Software, Kernel or Operating system, cryptographic Keys, Passwords, user data, etc. In this, securing the Kernel is extremely important as an intruder can even exploit the operating system characteristics just by changing the kernel code without introducing a trojan in the system. Also, the Kernel is the one entity that manages all permissions, so, if the kernel is hacked, these permissions also get compromised. The proposed approach is to make the kernel secure by doing the integrity check periodically of the kernel code loaded into the main memory of the system. This method uses ARM TrustZone technology which reduces the risk of attacks by hardware partition and separating the critical assets related to security. The Arm TrustZone technology protects the security-critical operations by executing them in a trusted execution environment (TEE). The idea to use the ARM TrustZone for the approach is, Kernel security check needs to be done at high privilege level than the Kernel. The kernel privilege level is Exception Level 1 (EL1), and the monitor code has the highest privilege level that is Exception Level 3 (EL3). This proposal can be used in all mid/low automotive ECUs where neither a dedicated hardware controller nor Trusted execution environment (TEE) is available.

About search

close

How to use the search box

You can enter up to 5 search conditions. The number of search boxes can be increased or decreased with the "+" and "-" buttons on the right.
If you enter multiple words separated by spaces in one search box, the data that "contains all" of the entered words will be searched (AND search).
Example) X (space) Y → "X and Y (including)"

How to use "AND" and "OR" pull-down

If "AND" is specified, the "contains both" data of the phrase entered in the previous and next search boxes will be searched. If you specify "OR", the data that "contains" any of the words entered in the search boxes before and after is searched.
Example) X AND Y → "X and Y (including)"  X OR Z → "X or Z (including)"
If AND and OR searches are mixed, OR search has priority.
Example) X AND Y OR Z → X AND (Y OR Z)
If AND search and multiple OR search are mixed, OR search has priority.
Example) W AND X OR Y OR Z → W AND (X OR Y OR Z)

How to use the search filters

Use the "search filters" when you want to narrow down the search results, such as when there are too many search results. If you check each item, the search results will be narrowed down to only the data that includes that item.
The number in "()" after each item is the number of data that includes that item.

Search tips

When searching by author name, enter the first and last name separated by a space, such as "Taro Jidosha".