Jump to ContentJump to Main Navigation
Show Summary Details
More options …

it - Information Technology

Methods and Applications of Informatics and Information Technology

Editor-in-Chief: Conrad, Stefan / Molitor, Paul

6 Issues per year

Online
ISSN
2196-7032
See all formats and pricing
More options …
Volume 58, Issue 6

Issues

Providing security on demand using invasive computing

Gabor Drescher
  • Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU), Lehrstuhl für Informatik 4, Martensstr. 1, D-91058 Erlangen, Germany Germany
  • Email
  • Other articles by this author:
  • De Gruyter OnlineGoogle Scholar
/ Christoph Erhardt
  • Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU), Lehrstuhl für Informatik 4, Martensstr. 1, D-91058 Erlangen, Germany Germany
  • Email
  • Other articles by this author:
  • De Gruyter OnlineGoogle Scholar
/ Felix Freiling
  • Corresponding author
  • Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU), Lehrstuhl für Informatik 1, Martensstr. 3, D-91058 Erlangen, Germany Germany
  • Email
  • Other articles by this author:
  • De Gruyter OnlineGoogle Scholar
/ Johannes Götzfried
  • Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU), Lehrstuhl für Informatik 1, Martensstr. 3, D-91058 Erlangen, Germany Germany
  • Email
  • Other articles by this author:
  • De Gruyter OnlineGoogle Scholar
/ Daniel Lohmann
  • Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU), Lehrstuhl für Informatik 4, Martensstr. 1, D-91058 Erlangen, Germany Germany
  • Email
  • Other articles by this author:
  • De Gruyter OnlineGoogle Scholar
/ Pieter Maene
  • KU Leuven, Department of Electrical Engineering (ESAT), COSIC, Kasteelpark Arenberg 10, B-3001 Heverlee, Belgium Belgium
  • Email
  • Other articles by this author:
  • De Gruyter OnlineGoogle Scholar
/ Tilo Müller
  • Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU), Lehrstuhl für Informatik 1, Martensstr. 3, D-91058 Erlangen, Germany Germany
  • Email
  • Other articles by this author:
  • De Gruyter OnlineGoogle Scholar
/ Ingrid Verbauwhede
  • KU Leuven, Department of Electrical Engineering (ESAT), COSIC, Kasteelpark Arenberg 10, B-3001 Heverlee, Belgium Belgium
  • Email
  • Other articles by this author:
  • De Gruyter OnlineGoogle Scholar
/ Andreas Weichslgartner
  • Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU), Lehrstuhl für Informatik 12, Cauerstr. 11, D-91058 Erlangen, Germany Germany
  • Email
  • Other articles by this author:
  • De Gruyter OnlineGoogle Scholar
/ Stefan Wildermann
  • Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU), Lehrstuhl für Informatik 12, Cauerstr. 11, D-91058 Erlangen, Germany Germany
  • Email
  • Other articles by this author:
  • De Gruyter OnlineGoogle Scholar
Published Online: 2016-09-30 | DOI: https://doi.org/10.1515/itit-2016-0032

Abstract

The invasive computing paradigm offers applications the possibility to dynamically spread their computation in a multicore/multiprocessor system in a resource-aware way. If applications are assumed to act maliciously, many security problems arise. In this acticle, we discuss different ways to deal with security problems in a resource-aware way. We first formalize the attacker model and the different security requirements that applications may have in multi-core systems. We then survey different hardware and software security mechanisms that can be dynamically configured to guarantee security on demand for invasive applications.

Keywords: Security and privacy – embedded systems security; security and privacy – operating systems security; security and privacy – information flow control; social and professional topics – computer crime

ACM CCS: Security and privacy →Systems security; Security and privacy →Systems security →Operating systems security; Security and privacy →Systems security →Information flow control; Social and professional topics →Computing/technology policy →Computer crime

About the article

Gabor Drescher

Gabor Drescher is a doctoral researcher at the chair for distributed systems and operating systems at Friedrich-Alexander University Erlangen-Nürnberg (FAU), Germany.

Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU), Lehrstuhl für Informatik 4, Martensstr. 1, D-91058 Erlangen, Germany

Christoph Erhardt

Christoph Erhardt is a doctoral researcher at the chair for distributed systems and operating systems at Friedrich-Alexander University Erlangen-Nürnberg (FAU), Germany.

Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU), Lehrstuhl für Informatik 4, Martensstr. 1, D-91058 Erlangen, Germany

Felix Freiling

Felix Freiling is a professor of computer science at Friedrich-Alexander University Erlangen-Nürnberg (FAU), Germany.

Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU), Lehrstuhl für Informatik 1, Martensstr. 3, D-91058 Erlangen, Germany

Johannes Götzfried

Johannes Götzfried is a doctoral researcher at the chair for IT-Security Infrastructures at Friedrich-Alexander University Erlangen-Nürnberg (FAU), Germany.

Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU), Lehrstuhl für Informatik 1, Martensstr. 3, D-91058 Erlangen, Germany

Daniel Lohmann

Daniel Lohmann is an associate professor (PD) at the chair for distributed systems and operating systems at Friedrich-Alexander University Erlangen-Nürnberg (FAU), Germany.

Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU), Lehrstuhl für Informatik 4, Martensstr. 1, D-91058 Erlangen, Germany

Pieter Maene

Pieter Maene is a doctoral researcher at the COSIC research group at KU Leuven, Belgium.

KU Leuven, Department of Electrical Engineering (ESAT), COSIC, Kasteelpark Arenberg 10, B-3001 Heverlee, Belgium

Tilo Müller

Tilo Müller is a post-doctoral researcher at the chair for IT-Security Infrastructures at Friedrich-Alexander University Erlangen-Nürnberg (FAU), Germany.

Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU), Lehrstuhl für Informatik 1, Martensstr. 3, D-91058 Erlangen, Germany

Ingrid Verbauwhede

Ingrid Verbauwhede is a professor of electrical engineering at the COSIC research group at KU Leuven, Belgium.

KU Leuven, Department of Electrical Engineering (ESAT), COSIC, Kasteelpark Arenberg 10, B-3001 Heverlee, Belgium

Andreas Weichslgartner

Andreas Weichslgartner is a doctoral researcher at the chair for Hardware/Software Co-Design at Friedrich-Alexander University Erlangen-Nürnberg (FAU), Germany.

Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU), Lehrstuhl für Informatik 12, Cauerstr. 11, D-91058 Erlangen, Germany

Stefan Wildermann

Stefan Wildermann is a post-doctoral researcher at the chair for Hardware/Software Co-Design at Friedrich-Alexander University Erlangen-Nürnberg (FAU), Germany.

Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU), Lehrstuhl für Informatik 12, Cauerstr. 11, D-91058 Erlangen, Germany


Revised: 2016-08-18

Accepted: 2016-09-02

Received: 2016-05-30

Published Online: 2016-09-30

Published in Print: 2016-12-28


Citation Information: it - Information Technology, Volume 58, Issue 6, Pages 281–295, ISSN (Online) 2196-7032, ISSN (Print) 1611-2776, DOI: https://doi.org/10.1515/itit-2016-0032.

Export Citation

©2016 Walter de Gruyter Berlin/Boston. Copyright Clearance Center

Comments (0)

Please log in or register to comment.
Log in