real-time operating system

12 articles

Guest Blog: Qt Commercial 4.8.3 Released with Official Support for VxWorks

By Tuukka Turunen, Digia This week, together with the Qt Project, Digia released version 4.8.3 of Qt Commercial. Developed together with Wind River, it now includes official support for VxWorks, Wind River's leading real-time operating system found in about one billion devices spanning a wide range of industries -- and can also be found in outer space! Qt is an excellent tool to create…

First Line of Defense

By Ka Kay Achacoso Designing security into a device requires an understanding of the nature of the attacker.  The cost of security implementation, including  acquiring the technology carrying out the processes, scales up with attacker sophistication.  A rule of thumb is to make the device tampering cost higher than the benefits gained from a security breach.    Wind River’s VxWorks…

MSL: How Big Is It?

By Mike Deliman I’ve been asked here and there “Just how big is this MSL thing?” It’s a question I can give several answers to, depending on what the asker means.  In physical terms, you could ride on it.  Here is a good example…in this photo of a worker and MSL, you can see the cruise shell is large enough to…

All Your Mars are Belong to US!

By Mike Deliman It's time to celebrate. We have returned to Mars with the most complex roving robotic laboratory ever sent to another planet. We have demonstrated and proved the Sky Crane concept, which opens doors onto other worlds that we have never had before. We can successfully deliver 1 metric ton to the surface of Mars.This is an achievement…

Complexity

By Mike Deliman This afternoon I watched the press conferences for Mars Science Laboratory “Curiosity” that were hosted by NASA/JPL from Pasadena, Ca.  These conferences were broadcast over NASA-TV, both on the cable/satellite channels and over the web.  If you haven’t seen the Seven Minutes Video I encourage you to watch it. Various scientists, directors and managers of the project…

Seven Minutes

By Mike Deliman This week, NASA hosted the Jet Propulsion Laboratory (JPL) scientists in charge of the Mars Science Laboratory rover, Curiosity, for a pre-landing press conference.  The landing sequences, called “ED&L” – Entry, Descent, and Landing – are the most action packed and critical operations other than the initial launch.  Pete Theisinger has described the EDL sequence as “7…

Improving Embedded Operating System Security Part 4: Partition Systems to Protect Essential Components

By Bill Graham An effective security technique is to separate different major components of a system into partitions. In some cases these partitions are physical, i.e., separate devices with physical separation. With modern virtualization technologies these partitions can be virtual, in software, on the same device or processor. An example of this would be combining a general purpose OS (GPOS)…

Improving Embedded Operating System Security Part 3: Secure Your Network Communication

By Bill Graham Many security issues with embedded systems stem from their connection via a network with access open to a large population (enterprise network) or even directly to the Internet.  Also, devices designed for small local private networks are increasingly connected to large corporate networks or the Internet directly. It’s safer to assume that all external connections to your…

Improving Embedded Operating System Security Part 2: Enable a More Secure Configuration

By Bill Graham  Despite the hype surrounding the state of embedded security, many of the runtime platforms that these systems are based on can be made more secure through proper configuration. Moreover, it’s important to keep the platform updated since the RTOS likely has many security vulnerabilities fixed that were present in older versions.  Default configurations for embedded operating systems…

Improving Embedded Operating System Security

By Bill Graham Security has quickly risen to the top of mind for embedded developers in the last year. Although the Stuxnet worm was a wake up call for the embedded industry, there have been several other notable incidents since. For example, attackers where able to gain control of a home insulin pump and change its settings (source http://www.cbsnews.com/8301-501465_162-20088598-501465.html). In…