Providing security on demand using invasive computing

Research output: Contribution to journalArticleResearch

Authors

  • Gabor Drescher
  • Christoph Erhardt
  • Felix Freiling
  • Johannes Götzfried
  • Daniel Lohmann
  • Pieter Maene
  • Tilo Müller
  • Ingrid Verbauwhede
  • Andreas Weichslgartner
  • Stefan Wildermann

External Research Organisations

  • Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU Erlangen-Nürnberg)
  • KU Leuven
View graph of relations

Details

Original languageEnglish
Pages (from-to)281-295
Number of pages15
Journalit - Information Technology
Volume58
Issue number6
Publication statusPublished - 30 Sept 2016
Externally publishedYes

Abstract

The invasive computing paradigm offers applications the possibility to dynamically spread their computation in a multicore/multiprocessor system in a resource-aware way. If applications are assumed to act maliciously, many security problems arise. In this acticle, we discuss different ways to deal with security problems in a resource-aware way. We first formalize the attacker model and the different security requirements that applications may have in multi-core systems. We then survey different hardware and software security mechanisms that can be dynamically configured to guarantee security on demand for invasive applications.

Keywords

    Security and privacy - embedded systems security, Security and privacy - information flow control, Security and privacy - operating systems security, Social and professional topics - computer crime

ASJC Scopus subject areas

Sustainable Development Goals

Cite this

Providing security on demand using invasive computing. / Drescher, Gabor; Erhardt, Christoph; Freiling, Felix et al.
In: it - Information Technology, Vol. 58, No. 6, 30.09.2016, p. 281-295.

Research output: Contribution to journalArticleResearch

Drescher, G, Erhardt, C, Freiling, F, Götzfried, J, Lohmann, D, Maene, P, Müller, T, Verbauwhede, I, Weichslgartner, A & Wildermann, S 2016, 'Providing security on demand using invasive computing', it - Information Technology, vol. 58, no. 6, pp. 281-295. https://doi.org/10.1515/itit-2016-0032
Drescher, G., Erhardt, C., Freiling, F., Götzfried, J., Lohmann, D., Maene, P., Müller, T., Verbauwhede, I., Weichslgartner, A., & Wildermann, S. (2016). Providing security on demand using invasive computing. it - Information Technology, 58(6), 281-295. https://doi.org/10.1515/itit-2016-0032
Drescher G, Erhardt C, Freiling F, Götzfried J, Lohmann D, Maene P et al. Providing security on demand using invasive computing. it - Information Technology. 2016 Sept 30;58(6):281-295. doi: 10.1515/itit-2016-0032
Drescher, Gabor ; Erhardt, Christoph ; Freiling, Felix et al. / Providing security on demand using invasive computing. In: it - Information Technology. 2016 ; Vol. 58, No. 6. pp. 281-295.
Download
@article{e5092d5427124328b6dd3afe12b97392,
title = "Providing security on demand using invasive computing",
abstract = "The invasive computing paradigm offers applications the possibility to dynamically spread their computation in a multicore/multiprocessor system in a resource-aware way. If applications are assumed to act maliciously, many security problems arise. In this acticle, we discuss different ways to deal with security problems in a resource-aware way. We first formalize the attacker model and the different security requirements that applications may have in multi-core systems. We then survey different hardware and software security mechanisms that can be dynamically configured to guarantee security on demand for invasive applications.",
keywords = "Security and privacy - embedded systems security, Security and privacy - information flow control, Security and privacy - operating systems security, Social and professional topics - computer crime",
author = "Gabor Drescher and Christoph Erhardt and Felix Freiling and Johannes G{\"o}tzfried and Daniel Lohmann and Pieter Maene and Tilo M{\"u}ller and Ingrid Verbauwhede and Andreas Weichslgartner and Stefan Wildermann",
note = "Funding information: This work was supported by the German Research Foundation (DFG) as part of the Transregional Collaborative Research Centre “Invasive Computing” (SFB/TR 89). Pieter Maene was supported by a Ph.D. fellowship from the Research Foundation – Flanders (FWO).",
year = "2016",
month = sep,
day = "30",
doi = "10.1515/itit-2016-0032",
language = "English",
volume = "58",
pages = "281--295",
number = "6",

}

Download

TY - JOUR

T1 - Providing security on demand using invasive computing

AU - Drescher, Gabor

AU - Erhardt, Christoph

AU - Freiling, Felix

AU - Götzfried, Johannes

AU - Lohmann, Daniel

AU - Maene, Pieter

AU - Müller, Tilo

AU - Verbauwhede, Ingrid

AU - Weichslgartner, Andreas

AU - Wildermann, Stefan

N1 - Funding information: This work was supported by the German Research Foundation (DFG) as part of the Transregional Collaborative Research Centre “Invasive Computing” (SFB/TR 89). Pieter Maene was supported by a Ph.D. fellowship from the Research Foundation – Flanders (FWO).

PY - 2016/9/30

Y1 - 2016/9/30

N2 - The invasive computing paradigm offers applications the possibility to dynamically spread their computation in a multicore/multiprocessor system in a resource-aware way. If applications are assumed to act maliciously, many security problems arise. In this acticle, we discuss different ways to deal with security problems in a resource-aware way. We first formalize the attacker model and the different security requirements that applications may have in multi-core systems. We then survey different hardware and software security mechanisms that can be dynamically configured to guarantee security on demand for invasive applications.

AB - The invasive computing paradigm offers applications the possibility to dynamically spread their computation in a multicore/multiprocessor system in a resource-aware way. If applications are assumed to act maliciously, many security problems arise. In this acticle, we discuss different ways to deal with security problems in a resource-aware way. We first formalize the attacker model and the different security requirements that applications may have in multi-core systems. We then survey different hardware and software security mechanisms that can be dynamically configured to guarantee security on demand for invasive applications.

KW - Security and privacy - embedded systems security

KW - Security and privacy - information flow control

KW - Security and privacy - operating systems security

KW - Social and professional topics - computer crime

UR - http://www.scopus.com/inward/record.url?scp=85053464809&partnerID=8YFLogxK

U2 - 10.1515/itit-2016-0032

DO - 10.1515/itit-2016-0032

M3 - Article

VL - 58

SP - 281

EP - 295

JO - it - Information Technology

JF - it - Information Technology

IS - 6

ER -