Skip to content

Commit e1e461c

Browse files
rusty1968FerralCoder
authored andcommitted
- Simplify title to "OpenPRoT Operating System Selection"
- Restructure opening paragraph for better flow and readability - Add paragraph explaining Rust OS requirement rationale
1 parent 0f55d78 commit e1e461c

File tree

1 file changed

+9
-3
lines changed

1 file changed

+9
-3
lines changed

docs/src/design/os-selection.md

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,14 @@
1-
# OpenPRoT Operating System Selection: Technical Decision Framework
1+
# OpenPRoT Operating System Selection
22

3-
Platform root of trust (PRoT) implementations require an operating system that provides hardware-enforced memory isolation, deterministic behavior, and fault recovery without compromising system integrity. OpenPRoT is an open-source, Rust-based project that provides a secure and reliable foundation for platform security, offering a Hardware Abstraction Layer (HAL) and suite of services for device attestation, secure firmware updates, and modern security protocols (SPDM, MCTP, PLDM) [5]. The OpenPRoT initiative evaluated multiple OS candidates to identify the optimal foundation for this security-critical embedded platform.
3+
Platform root of trust (PRoT) implementations require an operating system that provides hardware-enforced memory isolation, deterministic behavior, and fault recovery without compromising system integrity.
44

5-
This whitepaper documents our evaluation process and technical rationale for selecting Hubris [2] over Tock OS [3]. Both operating systems implement memory safety through Rust [6], but employ different architectural approaches to isolation, task management, and system composition.
5+
OpenPRoT addresses these requirements as an open-source, Rust-based platform that provides a secure foundation for platform security. The project offers a Hardware Abstraction Layer (HAL) and suite of services for device attestation, secure firmware updates, and modern security protocols (SPDM, MCTP, PLDM) [5].
6+
7+
The OpenPRoT workgroup (hereafter "the workgroup") evaluated best-in-class Rust embededded OSes to identify the optimal operating system for this security-critical embedded platform.
8+
9+
Rust-based operating systems were a non-negotiable requirement for OpenPRoT due to Rust's fundamental memory safety guarantees.
10+
11+
This whitepaper documents the workgroup's evaluation process and technical rationale for selecting Hubris [2] over Tock OS [3]. Both operating systems implement memory safety through Rust [6], but employ different architectural approaches to isolation, task management, and system composition.
612

713
Our evaluation framework assessed:
814

0 commit comments

Comments
 (0)