Abstract
Historically many safety-related and security-critical systems have been developed and qualified using single-core processors. These platforms could easily meet their increases in system performance requirements through higher processor clock speeds. However, the industry is now approaching the limit of relatively simple upgrade path, and there is an increasing trend towards the adoption of multicore processor architectures in critical systems to address higher performance demands. In this paper, we will review the challenges involved in migration to multicore processor architectures and the specific challenges related to their use in safety-critical and security-sensitive systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Amdahl GM (1967) Validity of the single-processor approach to achieving large-scale computing
capabilities. Proc Am Federation of Information Processing Societies Conf p483-485.
AFIPS Press
ARINC (2003) Avionics application software standard interface. ARINC Specification 653-1
ASSC (2010) Allied Standards Avionics Architecture Council. Avionics Systems Standardisation
Committee website. http://assconline.co.uk/asaac.asp. Accessed 9 August 2010
Barnes J (2005) Safe and secure software – an invitation to Ada 2005. AdaCore. http://www.adacore.com/home/ada_answers/ada_2005/safe_secure/. Accessed 9 August 2010
Bate I, Conmy P, Kelly T, McDermid J (2001) Use of modern processors in safety-critical applications. The Computer Journal 44:531-543
Cullmann C, Ferdinand C, Gebhard G, Grund D, Maiza (Burguière) C, Reineke J, Triquet B, Wilhelm R (2010) Predictability considerations in the design of multi-core embedded systems. Embedded real-time systems and software conference
DoD (1985) Trusted computer systems evaluation criteria, Department of Defense Standard 5200.28 (also known as Rainbow Series Orange Book). US Department of Defense. http://csrc.ncsl.nist.gov/publications/secpubs/rainbow/std001.txt. Accessed 9 August 2010
Holton G (2007) BAE SYSTEMS military air solutions, UK MOD Military Avionics Technology Exhibition.
ISO (2005) Common criteria for information technology security evaluation. ISO-15408 v3.1. http://www.commoncriteriaportal.org/index.html. Accessed 9 August 2010
Kinnan L (2009) Use of multicore processors in avionics systems and its potential impact on implementation and certification. 28th digital avionics systems conference
MAE (2010) First flight of carrier-based version of F-35 Joint Strike Fighter scheduled for this week. Military and Aerospace Electronics magazine, 3 June
Mann P (2002) Cyber security ‘missing’ from travel defenses. Aviation Week and Space Technology 8 July 2002 p41
NIAP (2007) US Government protection profile for separation kernels in environments requiring high robustness v1.03. National Information Assurance Partnership. http://www.niap-ccevs. org/pp/pp_skpp_hr_v1.03/. Accessed 20 September 2010
NSA (2000) National security telecommunications and information systems security policy (NSTISSP) No. 11, National Security Agency Information Assurance Directorate. http://www.cnss.gov/Assets/pdf/nstissp_11_fs.pdf. Accessed 9 August 2010
Parkinson P, Baker A (2010) High assurance systems development using the MILS architecture., Wind River technical white paper.http://www.windriver.com/whitepapers/. Accessed 9 August 2010
Perry W (1994) Specifications and standards – a new way of doing business. US DOD Memorandum, 29 June
Reagan R (1981) Executive Order 12333. The White House.http://www.ncs.gov/library/policy_docs/eo_12333.pdf Accessed 9 August 2010
RTCA (1992) Software considerations in airborne systems and equipment certification. RTCA DO-178B
RTCA (2000) Design assurance guidance for airborne electronic hardware. RTCA DO-254/
EUROCAE ED-80
RTCA (2005) Integrated Modular Avionics (IMA) development guidance and certification considerations.
RTCA DO-297/EUROCAE ED-124 Rushby J (1984) A trusted computing base for embedded systems. Proceedings 7th DoD/NBS Computer Security Conference, Gaithersburg, Maryland p294-311. http://fm.csl.sri.com/∼rushby/abstracts/ncsc84-tcb. Accessed 9 August 2010
Wikipedia (2010a) Eurofighter Typhoon. Wikipedia. http://en.wikipedia.org/wiki/Eurofighter_Typhoon. Accessed 9 August 2010
Wikipedia (2010b) Blue Pill (malware). Wikipedia online encyclopedia. http://en.wikipedia.org/wiki/Blue_Pill_%28malware%29. Accessed 9 August 2010
Wikipedia (2010c) Moore’s Law. Wikipedia online encyclopedia. http://en.wikipedia.org/wiki/Moore’27s_law. Accessed 9 August 2010
Wind River (2004) Smiths Aerospace selects Wind River for use in Boeing 7E7 common core system. Wind River press release. http://www.windriver.com/news/press/pr.html?ID=71.
Accessed 9 August 2010
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag London Limited
About this paper
Cite this paper
Parkinson, P. (2011). Safety, Security and Multicore. In: Dale, C., Anderson, T. (eds) Advances in Systems Safety. Springer, London. https://doi.org/10.1007/978-0-85729-133-2_13
Download citation
DOI: https://doi.org/10.1007/978-0-85729-133-2_13
Published:
Publisher Name: Springer, London
Print ISBN: 978-0-85729-132-5
Online ISBN: 978-0-85729-133-2
eBook Packages: Computer ScienceComputer Science (R0)