RTOS

22 articles

Improving Embedded Operating System Security Part 4: Partition Systems to Protect Essential Components

By Bill Graham An effective security technique is to separate different major components of a system into partitions. In some cases these partitions are physical, i.e., separate devices with physical separation. With modern virtualization technologies these partitions can be virtual, in software, on the same device or processor. An example of this would be combining a general purpose OS (GPOS)…

Improving Embedded Operating System Security Part 3: Secure Your Network Communication

By Bill Graham Many security issues with embedded systems stem from their connection via a network with access open to a large population (enterprise network) or even directly to the Internet.  Also, devices designed for small local private networks are increasingly connected to large corporate networks or the Internet directly. It’s safer to assume that all external connections to your…

Improving Embedded Operating System Security Part 2: Enable a More Secure Configuration

By Bill Graham  Despite the hype surrounding the state of embedded security, many of the runtime platforms that these systems are based on can be made more secure through proper configuration. Moreover, it’s important to keep the platform updated since the RTOS likely has many security vulnerabilities fixed that were present in older versions.  Default configurations for embedded operating systems…

Improving Embedded Operating System Security

By Bill Graham Security has quickly risen to the top of mind for embedded developers in the last year. Although the Stuxnet worm was a wake up call for the embedded industry, there have been several other notable incidents since. For example, attackers where able to gain control of a home insulin pump and change its settings (source http://www.cbsnews.com/8301-501465_162-20088598-501465.html). In…

Improving Embedded Security: Proper Runtime Selection

By Bill Graham Selection of secure components for an embedded system is key to a secure system. Leveraging a secure RTOS, middleware, virtualization and tools significantly reduces the effort and development costs. Moreover, there are additional benefits from using commercial-off-the-shelf (COTS) software components over Roll Your Own (RYO) code or self-ported and maintained open source code. Some of the COTS…

In embedded systems, a lifetime is a long time

By Bill Graham The recent news about the demise of the Mars Rover Spirit (Mike Deliman blogged about this last week) and comments about how it succeeded its mission many times over, got me thinking about just how long product lifetimes are for embedded products (see "End of Mars mission: Way beyond warranty" by Bob McDonald at the CBC). In many industries…

Wind River Turns 30: Looking Back and Moving Forward

By Tomas Evensen  2011 marks Wind River’s 30th anniversary. The big 3-0…it’s a major landmark moment in anyone’s book. This year, we’ll be taking time to honor this milestone with a retrospective of Wind River’s history and also a series of employee stories.  In my many years with the company, Wind River always impressed on me the concept of  being bigger than just…

Scalability: the key to product line success

By Bill Graham An important requirement for an RTOS such as VxWorks is scalability. What this really means is being usable in many different types of devices, from small memory constrained, low power devices (possibly battery powered, hand held, mobile) to large scale systems, multiple nodes networked together, possibly using multicore in a multi-OS environment. Scaling down is equally important…

VxWorks 6.9: A foundation for Innovation

By Bill Graham We just announced our latest major release of VxWorks 6.9 as the foundation for innovation in embedded software. What do we mean by this? There are two main aspects to this concept. Firstly, developers don't usually get enough time to innovate and work on differentiating features in a product (whiz bang capabilities that make the product stand…

Unsuspecting Benefit of Virtualization

By Chris Ault I came across an article the other day that was discussing forthcoming innovations in the automation industry. The article discusses how Ethernet is becoming ubiquitous for manufacturing, closing the numerous and incompatible communications protocols and media enabling communication among the various control and controlled systems. The article then goes on to draw industrial automation into the cloud for things such as inventory…