WHAT ARE EMBEDDED WHAT ARE EMBEDDED SYSTEMSSYSTEMS
THESE ARE SINGLE BOARD COMPUTERSTHESE ARE SINGLE BOARD COMPUTERS THESE ARE ELECTRONIC DEVICES THAT THESE ARE ELECTRONIC DEVICES THAT
INCORPORATE MICROPROCESSORSINCORPORATE MICROPROCESSORS THESE DEVICES ARE CONTROLLED BY THESE DEVICES ARE CONTROLLED BY
INSTRUCTIONS STORED IN A CHIPINSTRUCTIONS STORED IN A CHIP PROGRAMMES ARE STORED IN THE ROMPROGRAMMES ARE STORED IN THE ROM
TYPES OF EMBEDDED TYPES OF EMBEDDED SYSTEMSSYSTEMS
REACTIVE SYSTEMSREACTIVE SYSTEMSINTERACTIVE SYSTEMSINTERACTIVE SYSTEMSTRANSFORMATIONAL SYSTEMSTRANSFORMATIONAL SYSTEMS
REAL TIME EMBEDDED REAL TIME EMBEDDED SYSTEMSSYSTEMS
WHAT ARE REAL TIME SYSTEMSWHAT ARE REAL TIME SYSTEMS
TAKE THE INPUTTAKE THE INPUT PROCESS THE INPUTPROCESS THE INPUT GIVE THE REQUIRED RESULTGIVE THE REQUIRED RESULT ALSO CONSIDER THE TIMING CONSTRAINTSALSO CONSIDER THE TIMING CONSTRAINTS
TYPES OF TIMING TYPES OF TIMING CONSTRAINTSCONSTRAINTS
HARD TIME CONSTRAINTHARD TIME CONSTRAINTSOFT TIME CONSTRAINTSOFT TIME CONSTRAINTFIRM TIME CONSTRAINT FIRM TIME CONSTRAINT
HARD TIME CONSTRAINTHARD TIME CONSTRAINT
LATE & INCORRECT RESPONSELATE & INCORRECT RESPONSELEADS TO SYSTEM FAILURELEADS TO SYSTEM FAILURE
EXAMPLEEXAMPLEMEDICAL EQUIPMENT MONITORINGMEDICAL EQUIPMENT MONITORING
SOFT TIME CONSTRAINTSOFT TIME CONSTRAINT
TIMELINESS REQUIREMENTTIMELINESS REQUIREMENTSYSTEM FAILURE – DEPENDS ON SYSTEM FAILURE – DEPENDS ON
COMPUTATION TIMECOMPUTATION TIME
EXAMPLEEXAMPLEAIRLINE RESERVATION SYSTEMSAIRLINE RESERVATION SYSTEMS
FIRM TIME CONSTRAINTFIRM TIME CONSTRAINT
COMBINATION OF BOTH HARD & COMBINATION OF BOTH HARD & SOFT TIME CONSTRAINTSSOFT TIME CONSTRAINTS
SHORTER SOFT TIME REQUIRED SHORTER SOFT TIME REQUIRED LONGER HARD TIME REQUIREDLONGER HARD TIME REQUIRED
EXAMPLEEXAMPLEPATIENT VENTILATOR MECHANISMPATIENT VENTILATOR MECHANISM
REAL TIME OPERATING REAL TIME OPERATING SYSTEM(RTOS)SYSTEM(RTOS)
Correctness of the computations not onlyCorrectness of the computations not only
depends upon the logical correctness ofdepends upon the logical correctness of
the computation but also upon the time atthe computation but also upon the time at
which the result is produced. If the timingwhich the result is produced. If the timing
constraints of the system are not met,constraints of the system are not met,
system failure is said to have occurred.system failure is said to have occurred.
PROGRAMMING LANGUAGES PROGRAMMING LANGUAGES USED FOR EMBEDDED SYSTEMUSED FOR EMBEDDED SYSTEM
Assembly Assembly LanguageLanguage
C C C++C++JAVAJAVA
0.0%
10.0%
20.0%
30.0%
40.0%
50.0%
60.0%
70.0%
80.0%
90.0%
Assembly C C++ Java Other
2001-2002
2003-2004
FACTORS INFLUENCING FACTORS INFLUENCING CHOICE OF PROGRAMMING CHOICE OF PROGRAMMING
LANGUAGELANGUAGE
A language compiler should be A language compiler should be available for the chosen hardware available for the chosen hardware architecture of the embedded architecture of the embedded systemsystem
Compilers should be available on Compilers should be available on multiple Operating systems and multiple Operating systems and microprocessorsmicroprocessors
EMBEDDED HARDWAREEMBEDDED HARDWARE
MICROPROCESSOR MICROPROCESSOR /MICROCONTROLLER/MICROCONTROLLER
PDAPDA ROMROM DRAMDRAM LCDLCD
TYPES OF ATTACKS ON TYPES OF ATTACKS ON EMBEDDED SYSTEMEMBEDDED SYSTEM
PRIMARY ATTACKSPRIMARY ATTACKS
PRIVACY ATTACKSPRIVACY ATTACKS INTEGRITY ATTACKSINTEGRITY ATTACKS AVAILABILITY ATTACKSAVAILABILITY ATTACKS
SECONDARY ATTACKSSECONDARY ATTACKS
SOFTWARE ATTACKSSOFTWARE ATTACKS PHYSICAL ATTACKSPHYSICAL ATTACKS SIDE – CHANNEL ATTACKSSIDE – CHANNEL ATTACKS
Attacks on the Embedded
System
Privacy Attacks Integrity AttacksAvailability
Attacks
VirusesTrojan Horse
(Software Attacks)
Fault InjectionTiming Analysis(Side Channel
Attacks)
EavesdroppingMicro probing
(Physical Attacks)
COMMON SECURITY COMMON SECURITY FUNCTIONS REQUIREDFUNCTIONS REQUIRED
USER IDENTIFICATIONUSER IDENTIFICATIONSECURE NETWORK ACCESSSECURE NETWORK ACCESSAVAILABILITYAVAILABILITYSECURE STORAGESECURE STORAGECONTENT SECURITYCONTENT SECURITYTEMPER RESISTANCETEMPER RESISTANCE
TEMPER RESISTANCE
CONTENT SECURITY
SECURE STORAGE
SECURE NETWORK ACCESS
USER IDENTI-
FICATION
AVAILABILITY
BASIC SECURITY
FUNCTIONS
PRACTICES FOR SOFTWARE PRACTICES FOR SOFTWARE SECURITY APPLICABILITYSECURITY APPLICABILITY
SOFTWARE SECURITY
APPLICABILITY
REQUIREMENT LEVEL
DESIGN & ARCHITECTURE
LEVELCODE LEVEL
APPLICATIONSAPPLICATIONS
FOR HEART BEAT RATE & FOR HEART BEAT RATE & OXYGEN CONTENT IN OXYGEN CONTENT IN BLOODBLOOD
FOR GENERATION & FOR GENERATION & MEASUREMENT OF LIGHTMEASUREMENT OF LIGHT
FOR DISPLAYING THE FOR DISPLAYING THE RESULTRESULT
EXAMPLES OF EMBEDDED EXAMPLES OF EMBEDDED SYSTEMSSYSTEMS
CHILDREN’S TOYSCHILDREN’S TOYSCOMMUNICATION SYSTEMSCOMMUNICATION SYSTEMSCOMPUTER PERIPHERALSCOMPUTER PERIPHERALSHOME APPLIANCESHOME APPLIANCESMEDICAL IMAGING SYSTEMSMEDICAL IMAGING SYSTEMSROBOTSROBOTSPERSONAL DIGITAL ASSISTANTSPERSONAL DIGITAL ASSISTANTS
WHY OPT FOR THIS WHY OPT FOR THIS TECHNOLOGYTECHNOLOGY
Area of synergy between Hardware Area of synergy between Hardware & Software& Software
Reduce the size of the circuitReduce the size of the circuit
BIBLIOGRAPHYBIBLIOGRAPHY
Fundamentals of Embedded Fundamentals of Embedded Software By Daniel W. LewisSoftware By Daniel W. Lewis
Electronics For YouElectronics For Youwww.howstuffworks.comwww.howstuffworks.com