Autor: |
Drescher, Gabor, Erhardt, Christoph, Freiling, Felix, Götzfried, Johannes, Lohmann, Daniel, Maene, Pieter, Müller, Tilo, Verbauwhede, Ingrid, Weichslgartner, Andreas, Wildermann, Stefan |
Předmět: |
|
Zdroj: |
IT: Information Technology; Dec2016, Vol. 58 Issue 6, p281-295, 15p |
Abstrakt: |
The invasive computing paradigm offers applications the possibility to dynamically spread their computation in a multicore/multiprocessor system in a resource-aware way. If applications are assumed to act maliciously, many security problems arise. In this acticle, we discuss different ways to deal with security problems in a resource-aware way. We first formalize the attacker model and the different security requirements that applications may have in multi-core systems. We then survey different hardware and software security mechanisms that can be dynamically configured to guarantee security on demand for invasive applications. [ABSTRACT FROM AUTHOR] |
Databáze: |
Complementary Index |
Externí odkaz: |
|