Filters








4,295 Hits in 9.5 sec

Security, Performance and Energy Implications of Hardware-assisted Memory Protection Mechanisms on Event-based Streaming Systems [article]

Christian Göttel, Rafael Pires, Isabelly Rocha, Sébastien Vaucher, Pascal Felber, Marcelo Pasin, Valerio Schiavoni
2021 arXiv   pre-print
It is particularly difficult for homomorphic encryption to match performance requirements of modern workloads.  ...  Major cloud providers such as Amazon, Google and Microsoft provide nowadays some form of infrastructure as a service (IaaS) which allows deploying services in the form of virtual machines, containers or  ...  ACKNOWLEDGMENTS The authors would like to thank Christof Fetzer for the discussions on hardware-assisted memory protection mechanisms.  ... 
arXiv:2104.03731v1 fatcat:a7e2wuq6qrctxpr34jbekfimvm

Security, Performance and Energy Trade-Offs of Hardware-Assisted Memory Protection Mechanisms

Christian Gottel, Rafael Pires, Isabelly Rocha, Sebastien Vaucher, Pascal Felber, Marcelo Pasin, Valerio Schiavoni
2018 2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS)  
The performance trade-offs of two novel hardware-assisted memory protection mechanisms, namely AMD SEV and Intel SGX - currently available on the market to tackle this problem, are described in this practical  ...  Specifically, we implement and evaluate a publish/subscribe use-case and evaluate the impact of the memory protection mechanisms and the resulting performance.  ...  ACKNOWLEDGMENTS The authors would like to thank Christof Fetzer for the discussions on hardware-assisted memory protection mechanisms.  ... 
doi:10.1109/srds.2018.00024 dblp:conf/srds/GottelPRVFPS18 fatcat:6e2hn2sqlrdu5nw7amwbduduka

Hardware Security of Fog End-Devices for the Internet of Things

Ismail Butun, Alparslan Sari, Patrik Österberg
2020 Sensors  
review, including but not limited to Hardware Security Module, Physically Unclonable Function, System on a Chip, and Tamper Resistant Memory.  ...  Hence, this article first highlights the importance and benefits of fog computing for IoT networks, then investigates the means of providing hardware security to these devices with an enriched literature  ...  centers [37] , and re-configurable hardware-based isolation and protection mechanism (IPM) for IoT devices using cloud [38] .  ... 
doi:10.3390/s20205729 pmid:33050165 pmcid:PMC7601476 fatcat:d7s5tovoefcoxl4jdxntyo6uxu

A Guideline on Pseudorandom Number Generation (PRNG) in the IoT [article]

Peter Kietzmann, Thomas C. Schmidt, Matthias Wählisch
2020 arXiv   pre-print
A systematic evaluation of current IoT hardware components and popular software generators based on well-established test suits and on experiments for measuring performance give rise to a set of clear  ...  In this paper, we revisit the generation of randomness from the perspective of an IoT operating system (OS) that needs to support general purpose or crypto-secure random numbers.  ...  In the German research project I3 (ICN for the Industrial Internet) he explores IoT-based technologies for information centric networks and security components.  ... 
arXiv:2007.11839v2 fatcat:dkiqyrddgfbfngxo2ysca3rb6a

An IoT Endpoint System-on-Chip for Secure and Energy-Efficient Near-Sensor Analytics

Francesco Conti, Robert Schilling, Pasquale Davide Schiavone, Antonio Pullini, Davide Rossi, Frank Kagan Gurkaynak, Michael Muehlberghuber, Michael Gautschi, Igor Loi, Germain Haugou, Stefan Mangard, Luca Benini
2017 IEEE Transactions on Circuits and Systems Part 1: Regular Papers  
To cope with the combined workload of analytics and encryption in a tight power envelope, we propose Fulmine, a System-on-Chip based on a tightly-coupled multi-core cluster augmented with specialized blocks  ...  Using encryption to protect sensitive data at the boundary of the on-chip analytics engine is a way to address data security issues.  ...  to XEX [61] without implications to the overall security.  ... 
doi:10.1109/tcsi.2017.2698019 fatcat:x5o4ec64gnbirpxyqvor2swi7a

New Frontiers in IoT: Networking, Systems, Reliability, and Security Challenges [article]

Saurabh Bagchi, Tarek F. Abdelzaher, Ramesh Govindan, Prashant Shenoy, Akanksha Atrey, Pradipta Ghosh, Ran Xu
2020 arXiv   pre-print
We then discuss the unique challenges for reliability, security, and privacy posed by IoT systems due to their salient characteristics which include heterogeneity of devices and protocols, dependence on  ...  upon to run (such as, video and LIDAR processing) on constrained resources (on-node and network).  ...  It involves hardware, software, and often humans, with resource constraints on the hardware (cost, complexity, energy sources) and the software (complexity, compute and memory footprint, disconnected mode  ... 
arXiv:2005.07338v1 fatcat:a6hb5dpk7fgwreua5x2n7vlw7y

TinySec

Chris Karlof, Naveen Sastry, David Wagner
2004 Proceedings of the 2nd international conference on Embedded networked sensor systems - SenSys '04  
TinySec is portable to a variety of hardware and radio platforms.  ...  Our experimental results on a 36 node distributed sensor network application clearly demonstrate that software based link layer protocols are feasible and efficient, adding less than 10% energy, latency  ...  Acknowledgements Robert Szewczyk helped us measure the power consumption of TinySec.  ... 
doi:10.1145/1031495.1031515 dblp:conf/sensys/KarlofSW04 fatcat:6rhzqvs35bcmrjdvrn47v44a3u

A survey of language-based approaches to Cyber-Physical and embedded system development

Paul Soulier, Depeng Li, John R. Williams
2015 Tsinghua Science and Technology  
This paper presents an overview of the characteristics of embedded and cyber-physical systems and the associated requirements imposed on programming languages.  ...  Given the potential consequences of software related failures in such systems, a high degree of safety, security, and reliability is often required.  ...  As a result, CPS must manage a number of asynchronous events and use either thread or event-based mechanisms to accomplish this.  ... 
doi:10.1109/tst.2015.7085626 fatcat:rs54iizgpfdnfemrfxf5z5unli

A Proposed Virtualization Technique to Enhance IT Services

Nashaat el-Khameesy, Hossam Abdel Rahman Mohamed
2012 International Journal of Information Technology and Computer Science  
System virtualization is an antique art that will continue as long as applications need isolation and performance independence.  ...  However, it introduces another set of systems (virtual machines) that have to be controlled, provisioned, managed, updated, patched, and retired.  ...  Energy Efficiency We can help control infrastructure sprawl through the deployment of virtual servers and storage that run securely across a shared hardware environment.  ... 
doi:10.5815/ijitcs.2012.12.02 fatcat:3l5g5grfsrepfoars5evekpcvi

A Survey on Recent Advanced Research of CPS Security

Zhenhua Wang, Wei Xie, Baosheng Wang, Jing Tao, Enze Wang
2021 Applied Sciences  
Cyber-physical systems (CPSs) are next-generation intelligent systems that integrate computing, communication, and control. Malicious attacks on CPSs can lead to both property damage and casualties.  ...  Finally, we also perform a statistical analysis in terms of paper publication times, author institutes, countries, and sponsors to show the current worldwide CPS security research situation.  ...  Additionally, it deploys an online-offline notification mechanism to protect devices from time-of-checkto-time-of-use attacks assisted by the memory randomization technique.  ... 
doi:10.3390/app11093751 fatcat:fxby2wjzpnchrfshvilxalmptm

Microkernel Mechanisms for Improving the Trustworthiness of Commodity Hardware

Yanyan Shen, Kevin Elphinstone
2015 2015 11th European Dependable Computing Conference (EDCC)  
words maximum: (PLEASE TYPE) The thesis presents microkernel-based software-implemented mechanisms for improving the trustworthiness of computer systems based on commercial off-the-shelf (COTS) hardware  ...  We run synthetic benchmarks and system benchmarks to evaluate the performance overhead of the approach, observe that the overhead varies based on the characteristics of workloads and the variants (LC-RCoE  ...  Redundant MT Thread is based on a compiler and hardware multi-threading, and assumes ECC memory. HAFT Instruction is based on a compiler and hardware TSX, and assumes ECC memory.  ... 
doi:10.1109/edcc.2015.16 dblp:conf/edcc/ShenE15 fatcat:xq65e72x7zcnjbbmrwpgebqnxa

Safepower Project: Architecture For Safe And Power-Efficient Mixed-Criticality Systems

Maher Fakih, Alina Lenz, Mikel Azkarate-Askasua, Javier Coronel, Alfons Crespo, Simon Davidmann, Juan Carlos Diaz Garcia, Nera González Romero, Kim Grüttner, Sören Schreiner, Razi Seyyedi, Roman Obermaisser (+6 others)
2017 Zenodo  
With the ever increasing industrial demand for bigger, faster and more efficient systems, a growing number of cores is integrated on a single chip.  ...  One way to increase the cost-efficiency of such System on Chip (SoC) is to enhance the way the SoC handles its power resources.  ...  In this mixed-criticality area, there are several hardware and software mechanisms to protect critical parts from the non-secure ones.  ... 
doi:10.5281/zenodo.1216870 fatcat:46gbqu45lzct5mhsspuqt5i4wm

Hardware supported Software and Control Flow Integrity

Ruan de Clercq
2017 Zenodo  
This includes a detailed description and comparison of each architecture's policies, security, hardware cost, performance, and suitability for widespread deployment.  ...  The central topic of this thesis is the development of hardware-based mechanisms to prevent software from misbehaving.  ...  Moreover, hardware-based mechanisms provide better performance, since fewer processor cycles need to be spent on performing security checks.  ... 
doi:10.5281/zenodo.2643373 fatcat:3elmla7my5fa5jyeti73b7pnkm

Cloud-Based Augmentation for Mobile Devices: Motivation, Taxonomies, and Open Challenges

Saeid Abolfazli, Zohreh Sanaei, Ejaz Ahmed, Abdullah Gani, Rajkumar Buyya
2014 IEEE Communications Surveys and Tutorials  
The objectives of this study is to highlight the effects of remote resources on the quality and reliability of augmentation processes and discuss the challenges and opportunities of employing varied cloud-based  ...  Vital decision making and performance limitation factors that influence on the adoption of CMA approaches are introduced and an exemplary decision making flowchart for future CMA approaches are presented  ...  Although energy efficiency is one of the most important challenges of current CMA systems, several efforts such as [53] - [55] , [122] are endeavoring to comprehend the energy implications of exploiting  ... 
doi:10.1109/surv.2013.070813.00285 fatcat:77v7cyzdwrbonll45npxl4loxa

Cloud-Based Augmentation for Mobile Devices: Motivation, Taxonomies, and Open Challenges

Saeid Abolfazli, Zohreh Sanaei, Ejaz Ahmad, Abdullah Gani, Rajkumar Buyya
2014 Figshare  
The objectives of this study is to highlight the effects of remote resources on the quality and reliability of augmentation processes and discuss the challenges and opportunities of employing varied cloud-based  ...  Vital decision making and performance limitation factors that influence on the adoption of CMA approaches are introduced and an exemplary decision making flowchart for future CMA approaches are presented  ...  Although energy efficiency is one of the most important challenges of current CMA systems, several efforts such as [53] - [55] , [121] , [122] are endeavoring to comprehend the energy implications  ... 
doi:10.6084/m9.figshare.1038330 fatcat:y3ybv3eujjbu3o45pbh3tgid4u
« Previous Showing results 1 — 15 out of 4,295 results