Providing security on demand using invasive computing
- authored by
- Gabor Drescher, Christoph Erhardt, Felix Freiling, Johannes Götzfried, Daniel Lohmann, Pieter Maene, Tilo Müller, Ingrid Verbauwhede, Andreas Weichslgartner, Stefan Wildermann
- Abstract
The invasive computing paradigm offers applications the possibility to dynamically spread their computation in a multicore/multiprocessor system in a resource-aware way. If applications are assumed to act maliciously, many security problems arise. In this acticle, we discuss different ways to deal with security problems in a resource-aware way. We first formalize the attacker model and the different security requirements that applications may have in multi-core systems. We then survey different hardware and software security mechanisms that can be dynamically configured to guarantee security on demand for invasive applications.
- External Organisation(s)
-
Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU Erlangen-Nürnberg)
KU Leuven
- Type
- Article
- Journal
- it - Information Technology
- Volume
- 58
- Pages
- 281-295
- No. of pages
- 15
- Publication date
- 30.09.2016
- Publication status
- Published
- ASJC Scopus subject areas
- General Computer Science
- Sustainable Development Goals
- SDG 16 - Peace, Justice and Strong Institutions
- Electronic version(s)
-
https://doi.org/10.1515/itit-2016-0032 (Access:
Closed)