Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

x86 System Management Mode (SMM) Evaluation for Mixed Critical Systems

  • Conference paper
  • First Online:
Applications in Electronics Pervading Industry, Environment and Society (ApplePies 2020)

Abstract

As autonomous driving, industry 4.0, smart cities, etc. become very popular, safety relevant computing is demanding high performance processors to manage an increasing number of sensors, actuators and control units. In this context, safety critical environments (typically run by real time operating systems) have to co-exist with one or multiple functional rich environments, e.g., Linux. Existing virtualization technologies today are considered not secure enough to isolate these two execution environment types. For this reason this paper evaluates x86 System Management Mode (SMM) as a technology for building mixed critical virtualization solutions. Considering them as key performance indicators, interrupt context switch and the minimal round trip time overheads have been measured. The obtained results on an Intel platform of respectively 1.39 \(\upmu \)s and 12.73 \(\upmu \)s, confirm a high potential for SMM. At the best of our knowledge, this is the first work considering SMM as possible solution for mixed critical environments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Sierra-Arriaga, F., Branco, R., Lee, B.: Security issues and challenges for virtualization technologies. ACM Comput. Surv. (CSUR) 53(2), 1–37 (2020)

    Google Scholar 

  2. Duflot, L., Grumelard, O., Levillain, O., Morin, B.: ACPI and SMI handlers: some limits to trusted computing. J. Comput. Virol. 6(4), 353–374 (2010)

    Google Scholar 

  3. Rauchberger, J., Luh, R., Schrittwieser, S.: Longkit-a universal framework for BIOS/UEFI rootkits in system management mode. In: ICISSP, pp. 346–353 (2017)

    Google Scholar 

  4. Embleton, S., Sparks, S., Zou, C.C.: SMM rootkit: a new breed of OS independent malware. Secur. Commun. Netw. 6(12), 1590–1605 (2013)

    Google Scholar 

  5. Wojtczuk, R., Rutkowska, J.: Attacking intel trusted execution technology. Black Hat DC 2009, pp. 1–6 (2009)

    Google Scholar 

  6. Delgado, B., Karavanic, K.L.: Performance implications of system management mode. In: IEEE International Symposium on Workload Characterization (IISWC), pp. 163–173. IEEE (2013)

    Google Scholar 

  7. Zhang, F., Leach, K., Wang, H., Stavrou, A.: Trustlogin: securing password-login on commodity operating systems. In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, pp. 333–344 (2015)

    Google Scholar 

  8. Azab, A.M., Ning, P., Zhang, X.: SICE: a hardware-level strongly isolated computing environment for x86 multi-core platforms. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, pp. 375–388 (2011)

    Google Scholar 

  9. Intel®: Intel® 64 and IA-32 architectures software developer’s manual combined volumes: 1, 2A, 2B, 2C, 2D, 3A, 3B, 3C, 3D and 4 (2018)

    Google Scholar 

  10. Paoloni, G.: How to benchmark code execution times on intel IA-32 and IA-64 instruction set architectures. Intel Corporation 123 (2010)

    Google Scholar 

  11. de Carvalho, S.M.T., Campos, G.L.: Worst case response time approach evaluation for computing can messages response time in an automotive network. In: Brazilian Power Electronics Conference (COBEP), pp. 1–6. IEEE (2017)

    Google Scholar 

  12. Junior, E.A.S., de Araujo-Filho, P.F., Campelo, D.R.: Experimental evaluation of cryptography overhead in automotive safety-critical communication. In: IEEE 87th Vehicular Technology Conference (VTC Spring), pp. 1–5. IEEE (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Nikos Mouzakitis or Michele Paolino .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mouzakitis, N., Paolino, M., Grammatikakis, M.D., Raho, D. (2021). x86 System Management Mode (SMM) Evaluation for Mixed Critical Systems. In: Saponara, S., De Gloria, A. (eds) Applications in Electronics Pervading Industry, Environment and Society. ApplePies 2020. Lecture Notes in Electrical Engineering, vol 738. Springer, Cham. https://doi.org/10.1007/978-3-030-66729-0_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-66729-0_19

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-66728-3

  • Online ISBN: 978-3-030-66729-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics