Introduction
Dynamic strategy-based security Kernel is very important in an embedded system. The
reliability of an embedded system heavily depends on the architecture of the security Kernel
[1]. A security Kernel of key security-related statements that (a) works as a part of an
operating system to prevent unauthorized access to, or use of, the system and (b) contains
criteria that must be met before specified programs can be accessed. A security kernel is an
essential nucleus of a computer or network security implementation [2]. It is the core of a
secure computing environment that can be implemented in the form of a hardware component
installed in a computer or network topology, a software implementation, or a firmware system
installed in a computer microchip, or in an embedded system. By whatever it means, the
Kernel becomes the central location for establishing access permissions for a computer or
network's resources.
One early security Kernel implementation was a virtual machine monitor developed in the
1970s for the Digital Equipment Corporation® (DEC® ) virtual address extension (VAX)
computer systems [3]. The computer could be set up into multiple virtual machines that could
each run a different operating system, accessing to different resources and with different
security protocols. In this instance, the security Kernel resided on the real machine where the
virtual machines were established and handled access control for the different virtual
machines which could then have varying levels of security.
Embedded systems are part of a larger system that is primarily in an electronic [4]. In
industrialized countries, they outnumber people by about an order of magnitude. This
includes cell phones, PDAs, entertainment devices, cars, washing machines, smart cards,