Details
Original language | English |
---|---|
Pages (from-to) | 281-295 |
Number of pages | 15 |
Journal | it - Information Technology |
Volume | 58 |
Issue number | 6 |
Publication status | Published - 30 Sept 2016 |
Externally published | Yes |
Abstract
The invasive computing paradigm offers applications the possibility to dynamically spread their computation in a multicore/multiprocessor system in a resource-aware way. If applications are assumed to act maliciously, many security problems arise. In this acticle, we discuss different ways to deal with security problems in a resource-aware way. We first formalize the attacker model and the different security requirements that applications may have in multi-core systems. We then survey different hardware and software security mechanisms that can be dynamically configured to guarantee security on demand for invasive applications.
Keywords
- Security and privacy - embedded systems security, Security and privacy - information flow control, Security and privacy - operating systems security, Social and professional topics - computer crime
ASJC Scopus subject areas
- Computer Science(all)
- General Computer Science
Sustainable Development Goals
Cite this
- Standard
- Harvard
- Apa
- Vancouver
- BibTeX
- RIS
In: it - Information Technology, Vol. 58, No. 6, 30.09.2016, p. 281-295.
Research output: Contribution to journal › Article › Research
}
TY - JOUR
T1 - Providing security on demand using invasive computing
AU - Drescher, Gabor
AU - Erhardt, Christoph
AU - Freiling, Felix
AU - Götzfried, Johannes
AU - Lohmann, Daniel
AU - Maene, Pieter
AU - Müller, Tilo
AU - Verbauwhede, Ingrid
AU - Weichslgartner, Andreas
AU - Wildermann, Stefan
N1 - Funding information: This work was supported by the German Research Foundation (DFG) as part of the Transregional Collaborative Research Centre “Invasive Computing” (SFB/TR 89). Pieter Maene was supported by a Ph.D. fellowship from the Research Foundation – Flanders (FWO).
PY - 2016/9/30
Y1 - 2016/9/30
N2 - The invasive computing paradigm offers applications the possibility to dynamically spread their computation in a multicore/multiprocessor system in a resource-aware way. If applications are assumed to act maliciously, many security problems arise. In this acticle, we discuss different ways to deal with security problems in a resource-aware way. We first formalize the attacker model and the different security requirements that applications may have in multi-core systems. We then survey different hardware and software security mechanisms that can be dynamically configured to guarantee security on demand for invasive applications.
AB - The invasive computing paradigm offers applications the possibility to dynamically spread their computation in a multicore/multiprocessor system in a resource-aware way. If applications are assumed to act maliciously, many security problems arise. In this acticle, we discuss different ways to deal with security problems in a resource-aware way. We first formalize the attacker model and the different security requirements that applications may have in multi-core systems. We then survey different hardware and software security mechanisms that can be dynamically configured to guarantee security on demand for invasive applications.
KW - Security and privacy - embedded systems security
KW - Security and privacy - information flow control
KW - Security and privacy - operating systems security
KW - Social and professional topics - computer crime
UR - http://www.scopus.com/inward/record.url?scp=85053464809&partnerID=8YFLogxK
U2 - 10.1515/itit-2016-0032
DO - 10.1515/itit-2016-0032
M3 - Article
VL - 58
SP - 281
EP - 295
JO - it - Information Technology
JF - it - Information Technology
IS - 6
ER -