Abstract | ||
---|---|---|
The invasive computing paradigm offers applications the possibility to dynamically spread their computation in a multicore/multiprocessor system in a resource-aware way. If applications are assumed to act maliciously, many security problems arise. In this acticle, we discuss different ways to deal with security problems in a resource-aware way. We first formalize the attacker model and the different security requirements that applications may have in multi-core systems. We then survey different hardware and software security mechanisms that can be dynamically configured to guarantee security on demand for invasive applications. |
Year | DOI | Venue |
---|---|---|
2016 | 10.1515/itit-2016-0032 | IT-INFORMATION TECHNOLOGY |
Keywords | Field | DocType |
Security and privacy - embedded systems security, security and privacy - operating systems security, security and privacy - information flow control, social and professional topics - computer crime | On demand,Computer science,Computer security,Computer network | Journal |
Volume | Issue | ISSN |
58 | 6 | 1611-2776 |
Citations | PageRank | References |
0 | 0.34 | 0 |
Authors | ||
10 |
Name | Order | Citations | PageRank |
---|---|---|---|
Gabor Drescher | 1 | 8 | 2.67 |
Christoph Erhardt | 2 | 24 | 4.18 |
Felix C. Freiling | 3 | 1415 | 137.30 |
Johannes Götzfried | 4 | 99 | 8.43 |
Daniel Lohmann | 5 | 396 | 29.01 |
Pieter Maene | 6 | 48 | 4.68 |
Tilo Müller | 7 | 297 | 25.41 |
Ingrid Verbauwhede | 8 | 4650 | 404.57 |
Andreas Weichslgartner | 9 | 52 | 7.16 |
Stefan Wildermann | 10 | 156 | 26.00 |