Loading [MathJax]/extensions/tex2jax.js

Providing security on demand using invasive computing

Publikation: Beitrag in FachzeitschriftArtikelForschung

Autorschaft

  • Gabor Drescher
  • Christoph Erhardt
  • Felix Freiling
  • Johannes Götzfried
  • Daniel Lohmann

Externe Organisationen

  • Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU Erlangen-Nürnberg)
  • KU Leuven

Details

OriginalspracheEnglisch
Seiten (von - bis)281-295
Seitenumfang15
Fachzeitschriftit - Information Technology
Jahrgang58
Ausgabenummer6
PublikationsstatusVeröffentlicht - 30 Sept. 2016
Extern publiziertJa

Abstract

The invasive computing paradigm offers applications the possibility to dynamically spread their computation in a multicore/multiprocessor system in a resource-aware way. If applications are assumed to act maliciously, many security problems arise. In this acticle, we discuss different ways to deal with security problems in a resource-aware way. We first formalize the attacker model and the different security requirements that applications may have in multi-core systems. We then survey different hardware and software security mechanisms that can be dynamically configured to guarantee security on demand for invasive applications.

ASJC Scopus Sachgebiete

Ziele für nachhaltige Entwicklung

Zitieren

Providing security on demand using invasive computing. / Drescher, Gabor; Erhardt, Christoph; Freiling, Felix et al.
in: it - Information Technology, Jahrgang 58, Nr. 6, 30.09.2016, S. 281-295.

Publikation: Beitrag in FachzeitschriftArtikelForschung

Drescher, G, Erhardt, C, Freiling, F, Götzfried, J, Lohmann, D, Maene, P, Müller, T, Verbauwhede, I, Weichslgartner, A & Wildermann, S 2016, 'Providing security on demand using invasive computing', it - Information Technology, Jg. 58, Nr. 6, S. 281-295. https://doi.org/10.1515/itit-2016-0032
Drescher, G., Erhardt, C., Freiling, F., Götzfried, J., Lohmann, D., Maene, P., Müller, T., Verbauwhede, I., Weichslgartner, A., & Wildermann, S. (2016). Providing security on demand using invasive computing. it - Information Technology, 58(6), 281-295. https://doi.org/10.1515/itit-2016-0032
Drescher G, Erhardt C, Freiling F, Götzfried J, Lohmann D, Maene P et al. Providing security on demand using invasive computing. it - Information Technology. 2016 Sep 30;58(6):281-295. doi: 10.1515/itit-2016-0032
Drescher, Gabor ; Erhardt, Christoph ; Freiling, Felix et al. / Providing security on demand using invasive computing. in: it - Information Technology. 2016 ; Jahrgang 58, Nr. 6. S. 281-295.
Download
@article{e5092d5427124328b6dd3afe12b97392,
title = "Providing security on demand using invasive computing",
abstract = "The invasive computing paradigm offers applications the possibility to dynamically spread their computation in a multicore/multiprocessor system in a resource-aware way. If applications are assumed to act maliciously, many security problems arise. In this acticle, we discuss different ways to deal with security problems in a resource-aware way. We first formalize the attacker model and the different security requirements that applications may have in multi-core systems. We then survey different hardware and software security mechanisms that can be dynamically configured to guarantee security on demand for invasive applications.",
keywords = "Security and privacy - embedded systems security, Security and privacy - information flow control, Security and privacy - operating systems security, Social and professional topics - computer crime",
author = "Gabor Drescher and Christoph Erhardt and Felix Freiling and Johannes G{\"o}tzfried and Daniel Lohmann and Pieter Maene and Tilo M{\"u}ller and Ingrid Verbauwhede and Andreas Weichslgartner and Stefan Wildermann",
note = "Funding information: This work was supported by the German Research Foundation (DFG) as part of the Transregional Collaborative Research Centre “Invasive Computing” (SFB/TR 89). Pieter Maene was supported by a Ph.D. fellowship from the Research Foundation – Flanders (FWO).",
year = "2016",
month = sep,
day = "30",
doi = "10.1515/itit-2016-0032",
language = "English",
volume = "58",
pages = "281--295",
number = "6",

}

Download

TY - JOUR

T1 - Providing security on demand using invasive computing

AU - Drescher, Gabor

AU - Erhardt, Christoph

AU - Freiling, Felix

AU - Götzfried, Johannes

AU - Lohmann, Daniel

AU - Maene, Pieter

AU - Müller, Tilo

AU - Verbauwhede, Ingrid

AU - Weichslgartner, Andreas

AU - Wildermann, Stefan

N1 - Funding information: This work was supported by the German Research Foundation (DFG) as part of the Transregional Collaborative Research Centre “Invasive Computing” (SFB/TR 89). Pieter Maene was supported by a Ph.D. fellowship from the Research Foundation – Flanders (FWO).

PY - 2016/9/30

Y1 - 2016/9/30

N2 - The invasive computing paradigm offers applications the possibility to dynamically spread their computation in a multicore/multiprocessor system in a resource-aware way. If applications are assumed to act maliciously, many security problems arise. In this acticle, we discuss different ways to deal with security problems in a resource-aware way. We first formalize the attacker model and the different security requirements that applications may have in multi-core systems. We then survey different hardware and software security mechanisms that can be dynamically configured to guarantee security on demand for invasive applications.

AB - The invasive computing paradigm offers applications the possibility to dynamically spread their computation in a multicore/multiprocessor system in a resource-aware way. If applications are assumed to act maliciously, many security problems arise. In this acticle, we discuss different ways to deal with security problems in a resource-aware way. We first formalize the attacker model and the different security requirements that applications may have in multi-core systems. We then survey different hardware and software security mechanisms that can be dynamically configured to guarantee security on demand for invasive applications.

KW - Security and privacy - embedded systems security

KW - Security and privacy - information flow control

KW - Security and privacy - operating systems security

KW - Social and professional topics - computer crime

UR - http://www.scopus.com/inward/record.url?scp=85053464809&partnerID=8YFLogxK

U2 - 10.1515/itit-2016-0032

DO - 10.1515/itit-2016-0032

M3 - Article

VL - 58

SP - 281

EP - 295

JO - it - Information Technology

JF - it - Information Technology

IS - 6

ER -