Abstract
In this chapter we discuss the application of integrity models in a mixed-criticality system to enable the secure sharing of information. The sharing of resources and information in computer systems enables cost savings. The major technical challenge of these systems is simple: low criticality applications must be prevented from interfering with high criticality ones which execute in the same system. An example for such an integrated architecture is the the ACROSS MPSoC architecture which facilitates the implementation of hard real-time systems. We present an integrity model for the secure exchange of information between different levels of criticality within ACROSS. Our approach is based on Totel’s integrity model which proposes to upgrade information from low to high by rigorously validating this information. We were able to show that the encapsulation mechanisms of the ACROSS architecture support the implementation of the proposed integrity model.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
References
Avizienis A, Laprie JC, Randell B, Landwehr C (2004) Basic concepts and taxonomy of dependable and secure computing. IEEE Trans Dependable Secure Comput 1(1):11–33
Avizienis AA (1995) The methodology of N-version programming. In: Lyu M (ed) Software fault tolerance. Wiley, New York, pp 23–46
Banerjee A, Kumar V (2009) Anomaly detection: a survey. Technical report, ACM computing survey
Bell DE, LaPadula LJ (1975) Computer security model: unified exposition and multics interpretation. Technical report, MITRE Corp., Bedford
Biba KJ (1977) Integrity considerations for secure computer systems. Mitre Corporation, technical report
Boettcher C, DeLong R, Rushby J, Sifre W (2008) The MILS component integration approach to secure information sharing. In: Proceedings of the 27th digital avionics systems conference (DASC). IEEE/AIAA
Burton D, Delaney A, Newstead S, Logan D, Fields B (2004) Effectiveness of ABS and vehicle stability control systems. Technical report, Royal Automobile Club of Victoria (RACV) Ltd
Commission I.E.: IEC 61508 (2005) Functional safety of electrical/electronic/programmable electronic safety-related systems. In: 1st IEEE automotive electronics conference, pp 7–13
El-Salloum C, Elshuber M, Höftberger O, Isakovic H, Wasicek A (2012) The ACROSS MPSoC - a new generation of multi-core processors designed for safety-critical embedded systems. In: Proceedings of the 15th euromicro conference on digital systems design (DSD)
Evans DL, Bond PJ, Bement AL (2001) Security requireents for cryptographic modules. Federal Information Processing Stabdards Publication (Supercedes FIPS PUB 140–1)
Kopetz H (1995) Why time-triggered architectures will succeed in large hard real-time systems. In: FTDCS, pp 2–9
Kopetz H (2011) Real-time systems: design principles for distributed embedded applications, 2nd edn. Springer, Berlin
Laarouchi Y, Deswarte Y, Powell D, Arlat J (2003) Connecting commercial computers to avionics systems. In: 28th digital avionics systems conference pp 6.D.1-(1–9)
Lampson B, Abadi M, Burrows M, Wobber E (1992) Authentication in distributed systems: theory and practice. ACM Trans Comput Syst 10(4):265–310
Lorczak PR, Caglayan AK, Eckhardt DE (1989) A theoretical investigation of generalized voters for redundant systems. In: Digest of papers FTCS-19: the nineteenth international symposium on fault-tolerant, computing, pp 444–450
Matteucci M (2000) Hierarchical clustering algorithms. Available at: http://home.dei.polimi.it/matteucc/Clustering/tutorial_html/hierarchic% al.html
Morgan C (2002) Preliminary report: the incidence rate of odometer fraud. Technical report DOT HS 809 441, national highway traffic safety administration (NHTSA)
Obermaisser R, El Salloum C, Huber B, Kopetz H (2009) From a federated to an integrated automotive architecture. IEEE Trans Comput Aided Des Integr Circ Syst 28(7):956–965
Subramaniam S, Palpanas T, Papadopoulos D, Kalogeraki V, Gunopulos D (2006) Online outlier detection in sensor data using non-parametric models. In: Proceedings of the 32nd international conference on very large data bases (VLDB), pp 187–197
Totel E, Blanquart JP, Deswarte Y, Powell D (2000) Supporting multiple levels of criticality. ESPRIT project 20716: GUARDS
Wasicek A, Mair T (2012) Secure information sharing in mixed-criticality systems. In: Lecture notes in engineering and computer science: proceedings of the world congress on engineering and computer science 2012, IAENG, pp 23–29
Wasicek A, Salloum CE (2010) A system-on-a-chip platform for mixed-criticality applications. In: Proceedings of 13th IEEE international symposium on object/component/service-oriented real-time distributed computing (ISORC)
Acknowledgments
This document is based on the ACROSS project in the framework of the ARTEMIS program. The work has been funded in part by the ARTEMIS Joint Undertaking and National Funding Agencies under the funding ID ARTEMIS-2009-1-100208.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer Science+Business Media Dordrecht
About this chapter
Cite this chapter
Wasicek, A. (2014). The ACROSS Integrity Model. In: Kim, H., Ao, SI., Amouzegar, M., Rieger, B. (eds) IAENG Transactions on Engineering Technologies. Lecture Notes in Electrical Engineering, vol 247. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-6818-5_24
Download citation
DOI: https://doi.org/10.1007/978-94-007-6818-5_24
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-6817-8
Online ISBN: 978-94-007-6818-5
eBook Packages: EngineeringEngineering (R0)