Skip to content
Licensed Unlicensed Requires Authentication Published by De Gruyter Oldenbourg September 30, 2016

Providing security on demand using invasive computing

Gabor Drescher, Christoph Erhardt, Felix Freiling, Johannes Götzfried, Daniel Lohmann, Pieter Maene, Tilo Müller, Ingrid Verbauwhede, Andreas Weichslgartner and Stefan Wildermann

Abstract

The invasive computing paradigm offers applications the possibility to dynamically spread their computation in a multicore/multiprocessor system in a resource-aware way. If applications are assumed to act maliciously, many security problems arise. In this acticle, we discuss different ways to deal with security problems in a resource-aware way. We first formalize the attacker model and the different security requirements that applications may have in multi-core systems. We then survey different hardware and software security mechanisms that can be dynamically configured to guarantee security on demand for invasive applications.

Acknowledgement

This work was supported by the German Research Foundation (DFG) as part of the Transregional Collaborative Research Centre “Invasive Computing” (SFB/TR 89). Pieter Maene was supported by a Ph.D. fellowship from the Research Foundation – Flanders (FWO).

Received: 2016-5-30
Revised: 2016-8-18
Accepted: 2016-9-2
Published Online: 2016-9-30
Published in Print: 2016-12-28

©2016 Walter de Gruyter Berlin/Boston