Power-Aware Design Techniques of Secure Multimode Embedded Systems

被引:6
作者
Jiang, Ke [1 ]
Eles, Petru [1 ]
Peng, Zebo [1 ]
机构
[1] Linkoping Univ, Dept Comp & Informat Sci, S-58183 Linkoping, Sweden
基金
瑞典研究理事会;
关键词
Design; Performance; Security; Embedded systems; multimode systems; system design and optimization; security; power-aware design; multiobjective optimization;
D O I
10.1145/2801152
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, embedded systems have been widely used in all types of application areas, some of which belong to the safety and reliability critical domains. The functional correctness and design robustness of the embedded systems involved in such domains are crucial for the safety of personal/enterprise property or even human lives. Thereby, a holistic design procedure that considers all the important design concerns is essential. In this article, we approach embedded systems design from an integral perspective. We consider not only the classic real-time and quality of service requirements, but also the emerging security and power efficiency demands. Modern embedded systems are not any more developed for a fixed purpose, but instead designed for undertaking various processing requests. This leads to the concept of multimode embedded systems, in which the number and nature of active tasks change during runtime. Under dynamic situations, providing high performance along with various design concerns becomes a really difficult problem. Therefore, we propose a novel power-aware secure embedded systems design framework that efficiently solves the problem of runtime quality optimization with security and power constraints. The efficiency of our proposed techniques are evaluated in extensive experiments.
引用
收藏
页数:29
相关论文
共 51 条
[1]  
Bao M, 2009, DES AUT CON, P490
[2]  
Biryukov A, 1998, LECT NOTES COMPUT SC, V1403, P85, DOI 10.1007/BFb0054119
[3]  
Christof P., 2010, Understanding Cryptography: A Textbook for Students and Practitioners
[4]  
Cisco, 2014, H 264 COD
[5]   A fast and elitist multiobjective genetic algorithm: NSGA-II [J].
Deb, K ;
Pratap, A ;
Agarwal, S ;
Meyarivan, T .
IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 2002, 6 (02) :182-197
[6]  
Degener Jutta, 1992, GSM 06 10
[7]   A table masking countermeasure for low-energy secure embedded systems [J].
Gebotys, Catherine H. .
IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2006, 14 (07) :740-753
[8]  
Hagman Johan, 1997, MP3 DECODER
[9]  
Hofmeyr S. A., 1998, Journal of Computer Security, V6, P151
[10]  
Huang P., 2013, P 28 ANN ACM S APPL, P1517