Details
Originalsprache | Englisch |
---|---|
Seiten (von - bis) | 281-295 |
Seitenumfang | 15 |
Fachzeitschrift | it - Information Technology |
Jahrgang | 58 |
Ausgabenummer | 6 |
Publikationsstatus | Veröffentlicht - 30 Sept. 2016 |
Extern publiziert | Ja |
Abstract
The invasive computing paradigm offers applications the possibility to dynamically spread their computation in a multicore/multiprocessor system in a resource-aware way. If applications are assumed to act maliciously, many security problems arise. In this acticle, we discuss different ways to deal with security problems in a resource-aware way. We first formalize the attacker model and the different security requirements that applications may have in multi-core systems. We then survey different hardware and software security mechanisms that can be dynamically configured to guarantee security on demand for invasive applications.
ASJC Scopus Sachgebiete
- Informatik (insg.)
- Allgemeine Computerwissenschaft
Ziele für nachhaltige Entwicklung
Zitieren
- Standard
- Harvard
- Apa
- Vancouver
- BibTex
- RIS
in: it - Information Technology, Jahrgang 58, Nr. 6, 30.09.2016, S. 281-295.
Publikation: Beitrag in Fachzeitschrift › Artikel › Forschung
}
TY - JOUR
T1 - Providing security on demand using invasive computing
AU - Drescher, Gabor
AU - Erhardt, Christoph
AU - Freiling, Felix
AU - Götzfried, Johannes
AU - Lohmann, Daniel
AU - Maene, Pieter
AU - Müller, Tilo
AU - Verbauwhede, Ingrid
AU - Weichslgartner, Andreas
AU - Wildermann, Stefan
N1 - Funding information: This work was supported by the German Research Foundation (DFG) as part of the Transregional Collaborative Research Centre “Invasive Computing” (SFB/TR 89). Pieter Maene was supported by a Ph.D. fellowship from the Research Foundation – Flanders (FWO).
PY - 2016/9/30
Y1 - 2016/9/30
N2 - The invasive computing paradigm offers applications the possibility to dynamically spread their computation in a multicore/multiprocessor system in a resource-aware way. If applications are assumed to act maliciously, many security problems arise. In this acticle, we discuss different ways to deal with security problems in a resource-aware way. We first formalize the attacker model and the different security requirements that applications may have in multi-core systems. We then survey different hardware and software security mechanisms that can be dynamically configured to guarantee security on demand for invasive applications.
AB - The invasive computing paradigm offers applications the possibility to dynamically spread their computation in a multicore/multiprocessor system in a resource-aware way. If applications are assumed to act maliciously, many security problems arise. In this acticle, we discuss different ways to deal with security problems in a resource-aware way. We first formalize the attacker model and the different security requirements that applications may have in multi-core systems. We then survey different hardware and software security mechanisms that can be dynamically configured to guarantee security on demand for invasive applications.
KW - Security and privacy - embedded systems security
KW - Security and privacy - information flow control
KW - Security and privacy - operating systems security
KW - Social and professional topics - computer crime
UR - http://www.scopus.com/inward/record.url?scp=85053464809&partnerID=8YFLogxK
U2 - 10.1515/itit-2016-0032
DO - 10.1515/itit-2016-0032
M3 - Article
VL - 58
SP - 281
EP - 295
JO - it - Information Technology
JF - it - Information Technology
IS - 6
ER -