Consideration of Security Attacks in the Design Space Exploration of Embedded Systems

Publikation: KonferenzbeitragPaperForschungBegutachtung

Abstract

Designing secure systems is a complex task, particularly for designers who are no security experts. Cyber security plays a key role in embedded systems, especially for the domain of the Internet of Things (IoT). IoT systems of this kind are becoming increasingly important in daily life as they simplify various tasks. They are usually small, either embedded into bigger systems or battery driven, and perform monitoring or one shot tasks. Thus, they are subject to manifold constraints in terms of performance, power consumption, chip area, etc. As they are continuously connected to the internet and utilize our private data to perform their tasks, they are interesting for potential attackers. Cyber security thus plays an important role for the design of an IoT system. As the usage of security measures usually increases both computation time, as well as power consumption, a conflict between these constraints must be solved. For the designers of such systems, balancing these constraints constitutes a highly complex task. In this paper we propose a novel approach for considering possible security attacks on embedded systems, simplifying the consideration of security requirements immediately at the start of the design process. We introduce a security aware design space exploration framework which based on an architectural, behavioral and security attack description, finds the optimal design for IoT systems. We also demonstrate the feasibility and the benefits of our framework based on a door access system use case.
Originalspracheenglisch
PublikationsstatusVeröffentlicht - Okt 2019
Veranstaltung 2019 22nd Euromicro Conference on Digital System Design (DSD) - Kallithea, Griechenland
Dauer: 28 Aug 201930 Aug 2019

Konferenz

Konferenz 2019 22nd Euromicro Conference on Digital System Design (DSD)
LandGriechenland
OrtKallithea
Zeitraum28/08/1930/08/19

Fingerprint

Embedded systems
Electric power utilization
Internet
Internet of things
Monitoring

ASJC Scopus subject areas

  • !!Computer Graphics and Computer-Aided Design

Dies zitieren

Gressl, L. A., Steger, C., & Neffe, U. (2019). Consideration of Security Attacks in the Design Space Exploration of Embedded Systems. Beitrag in 2019 22nd Euromicro Conference on Digital System Design (DSD), Kallithea, Griechenland.

Consideration of Security Attacks in the Design Space Exploration of Embedded Systems. / Gressl, Lukas Alexander; Steger, Christian; Neffe, Ulrich.

2019. Beitrag in 2019 22nd Euromicro Conference on Digital System Design (DSD), Kallithea, Griechenland.

Publikation: KonferenzbeitragPaperForschungBegutachtung

Gressl, LA, Steger, C & Neffe, U 2019, 'Consideration of Security Attacks in the Design Space Exploration of Embedded Systems' Beitrag in, Kallithea, Griechenland, 28/08/19 - 30/08/19, .
Gressl LA, Steger C, Neffe U. Consideration of Security Attacks in the Design Space Exploration of Embedded Systems. 2019. Beitrag in 2019 22nd Euromicro Conference on Digital System Design (DSD), Kallithea, Griechenland.
Gressl, Lukas Alexander ; Steger, Christian ; Neffe, Ulrich. / Consideration of Security Attacks in the Design Space Exploration of Embedded Systems. Beitrag in 2019 22nd Euromicro Conference on Digital System Design (DSD), Kallithea, Griechenland.
@conference{f3e5f2d3239443b5a122d45fc38945b5,
title = "Consideration of Security Attacks in the Design Space Exploration of Embedded Systems",
abstract = "Designing secure systems is a complex task, particularly for designers who are no security experts. Cyber security plays a key role in embedded systems, especially for the domain of the Internet of Things (IoT). IoT systems of this kind are becoming increasingly important in daily life as they simplify various tasks. They are usually small, either embedded into bigger systems or battery driven, and perform monitoring or one shot tasks. Thus, they are subject to manifold constraints in terms of performance, power consumption, chip area, etc. As they are continuously connected to the internet and utilize our private data to perform their tasks, they are interesting for potential attackers. Cyber security thus plays an important role for the design of an IoT system. As the usage of security measures usually increases both computation time, as well as power consumption, a conflict between these constraints must be solved. For the designers of such systems, balancing these constraints constitutes a highly complex task. In this paper we propose a novel approach for considering possible security attacks on embedded systems, simplifying the consideration of security requirements immediately at the start of the design process. We introduce a security aware design space exploration framework which based on an architectural, behavioral and security attack description, finds the optimal design for IoT systems. We also demonstrate the feasibility and the benefits of our framework based on a door access system use case.",
author = "Gressl, {Lukas Alexander} and Christian Steger and Ulrich Neffe",
year = "2019",
month = "10",
language = "English",
note = "2019 22nd Euromicro Conference on Digital System Design (DSD) ; Conference date: 28-08-2019 Through 30-08-2019",

}

TY - CONF

T1 - Consideration of Security Attacks in the Design Space Exploration of Embedded Systems

AU - Gressl, Lukas Alexander

AU - Steger, Christian

AU - Neffe, Ulrich

PY - 2019/10

Y1 - 2019/10

N2 - Designing secure systems is a complex task, particularly for designers who are no security experts. Cyber security plays a key role in embedded systems, especially for the domain of the Internet of Things (IoT). IoT systems of this kind are becoming increasingly important in daily life as they simplify various tasks. They are usually small, either embedded into bigger systems or battery driven, and perform monitoring or one shot tasks. Thus, they are subject to manifold constraints in terms of performance, power consumption, chip area, etc. As they are continuously connected to the internet and utilize our private data to perform their tasks, they are interesting for potential attackers. Cyber security thus plays an important role for the design of an IoT system. As the usage of security measures usually increases both computation time, as well as power consumption, a conflict between these constraints must be solved. For the designers of such systems, balancing these constraints constitutes a highly complex task. In this paper we propose a novel approach for considering possible security attacks on embedded systems, simplifying the consideration of security requirements immediately at the start of the design process. We introduce a security aware design space exploration framework which based on an architectural, behavioral and security attack description, finds the optimal design for IoT systems. We also demonstrate the feasibility and the benefits of our framework based on a door access system use case.

AB - Designing secure systems is a complex task, particularly for designers who are no security experts. Cyber security plays a key role in embedded systems, especially for the domain of the Internet of Things (IoT). IoT systems of this kind are becoming increasingly important in daily life as they simplify various tasks. They are usually small, either embedded into bigger systems or battery driven, and perform monitoring or one shot tasks. Thus, they are subject to manifold constraints in terms of performance, power consumption, chip area, etc. As they are continuously connected to the internet and utilize our private data to perform their tasks, they are interesting for potential attackers. Cyber security thus plays an important role for the design of an IoT system. As the usage of security measures usually increases both computation time, as well as power consumption, a conflict between these constraints must be solved. For the designers of such systems, balancing these constraints constitutes a highly complex task. In this paper we propose a novel approach for considering possible security attacks on embedded systems, simplifying the consideration of security requirements immediately at the start of the design process. We introduce a security aware design space exploration framework which based on an architectural, behavioral and security attack description, finds the optimal design for IoT systems. We also demonstrate the feasibility and the benefits of our framework based on a door access system use case.

M3 - Paper

ER -