Projects per year
System designers are often faced with a huge variety of alternative hardware platforms and architectures, when designing new products. Especially the various options for allocating a set of tasks to processing units greatly influences the overall system performance and power consumption. As the possible design space is too complex for manual evaluation, automatic Design Space Exploration (DSE) tools are used for selecting first system designs. These tools assess the various mappings between tasks and processing units. They target the best allocation, optimizing the system's performance and power consumption, while considering other predefined design constraints. Traditionally , security requirements do not belong to the set of design constraints these tools deal with. Thus, security requirements must be introduced manually, which might induce additional costs to the overall project. To enable security-by-design using DSE, the Security Aware Design Space Exploration (SADSE) Framework was developed. This framework allows the integration of attack scenarios and security requirements, as well as platform security features into the DSE, at a level of detail not yet considered by other tools. SADSE allows an optimal allocation of tasks onto hardware platforms, while satisfying predefined security constraints. This paper shows how security requirements and attack vectors are modeled in SADSE, followed by the evaluation of a keyless entry system use case, where the tool finds a secure mapping of tasks to processing units.
|Title of host publication||ICONS 2019|
|Subtitle of host publication||The Fourteenth International Conference on Systems|
|Editors||Sandra Sendra Compte|
|Publication status||Published - Mar 2019|
|Event||ICONS 2019: Fourteenth International Conference on Systems - Holiday Inn Express Valencia-Ciudad Las Ciencias, Valencia, Spain|
Duration: 24 Mar 2019 → 28 Mar 2019
|Abbreviated title||ICONS 2019|
|Period||24/03/19 → 28/03/19|
ASJC Scopus subject areas
- Computer Science (miscellaneous)
FingerprintDive into the research topics of 'A Security Aware Design Space Exploration Framework'. Together they form a unique fingerprint.
- 1 Talk at conference or symposium