Consideration of Security Attacks in the Design Space Exploration of Embedded Systems

Research output: Contribution to conferencePaperResearchpeer-review

Abstract

Designing secure systems is a complex task, particularly for designers who are no security experts. Cyber security plays a key role in embedded systems, especially for the domain of the Internet of Things (IoT). IoT systems of this kind are becoming increasingly important in daily life as they simplify various tasks. They are usually small, either embedded into bigger systems or battery driven, and perform monitoring or one shot tasks. Thus, they are subject to manifold constraints in terms of performance, power consumption, chip area, etc. As they are continuously connected to the internet and utilize our private data to perform their tasks, they are interesting for potential attackers. Cyber security thus plays an important role for the design of an IoT system. As the usage of security measures usually increases both computation time, as well as power consumption, a conflict between these constraints must be solved. For the designers of such systems, balancing these constraints constitutes a highly complex task. In this paper we propose a novel approach for considering possible security attacks on embedded systems, simplifying the consideration of security requirements immediately at the start of the design process. We introduce a security aware design space exploration framework which based on an architectural, behavioral and security attack description, finds the optimal design for IoT systems. We also demonstrate the feasibility and the benefits of our framework based on a door access system use case.
Original languageEnglish
Publication statusPublished - Oct 2019
Event 2019 22nd Euromicro Conference on Digital System Design (DSD) - Kallithea, Greece
Duration: 28 Aug 201930 Aug 2019

Conference

Conference 2019 22nd Euromicro Conference on Digital System Design (DSD)
CountryGreece
CityKallithea
Period28/08/1930/08/19

Fingerprint

Embedded systems
Electric power utilization
Internet
Internet of things
Monitoring

ASJC Scopus subject areas

  • Computer Graphics and Computer-Aided Design

Cite this

Gressl, L. A., Steger, C., & Neffe, U. (2019). Consideration of Security Attacks in the Design Space Exploration of Embedded Systems. Paper presented at 2019 22nd Euromicro Conference on Digital System Design (DSD), Kallithea, Greece.

Consideration of Security Attacks in the Design Space Exploration of Embedded Systems. / Gressl, Lukas Alexander; Steger, Christian; Neffe, Ulrich.

2019. Paper presented at 2019 22nd Euromicro Conference on Digital System Design (DSD), Kallithea, Greece.

Research output: Contribution to conferencePaperResearchpeer-review

Gressl, LA, Steger, C & Neffe, U 2019, 'Consideration of Security Attacks in the Design Space Exploration of Embedded Systems' Paper presented at 2019 22nd Euromicro Conference on Digital System Design (DSD), Kallithea, Greece, 28/08/19 - 30/08/19, .
Gressl LA, Steger C, Neffe U. Consideration of Security Attacks in the Design Space Exploration of Embedded Systems. 2019. Paper presented at 2019 22nd Euromicro Conference on Digital System Design (DSD), Kallithea, Greece.
Gressl, Lukas Alexander ; Steger, Christian ; Neffe, Ulrich. / Consideration of Security Attacks in the Design Space Exploration of Embedded Systems. Paper presented at 2019 22nd Euromicro Conference on Digital System Design (DSD), Kallithea, Greece.
@conference{f3e5f2d3239443b5a122d45fc38945b5,
title = "Consideration of Security Attacks in the Design Space Exploration of Embedded Systems",
abstract = "Designing secure systems is a complex task, particularly for designers who are no security experts. Cyber security plays a key role in embedded systems, especially for the domain of the Internet of Things (IoT). IoT systems of this kind are becoming increasingly important in daily life as they simplify various tasks. They are usually small, either embedded into bigger systems or battery driven, and perform monitoring or one shot tasks. Thus, they are subject to manifold constraints in terms of performance, power consumption, chip area, etc. As they are continuously connected to the internet and utilize our private data to perform their tasks, they are interesting for potential attackers. Cyber security thus plays an important role for the design of an IoT system. As the usage of security measures usually increases both computation time, as well as power consumption, a conflict between these constraints must be solved. For the designers of such systems, balancing these constraints constitutes a highly complex task. In this paper we propose a novel approach for considering possible security attacks on embedded systems, simplifying the consideration of security requirements immediately at the start of the design process. We introduce a security aware design space exploration framework which based on an architectural, behavioral and security attack description, finds the optimal design for IoT systems. We also demonstrate the feasibility and the benefits of our framework based on a door access system use case.",
author = "Gressl, {Lukas Alexander} and Christian Steger and Ulrich Neffe",
year = "2019",
month = "10",
language = "English",
note = "2019 22nd Euromicro Conference on Digital System Design (DSD) ; Conference date: 28-08-2019 Through 30-08-2019",

}

TY - CONF

T1 - Consideration of Security Attacks in the Design Space Exploration of Embedded Systems

AU - Gressl, Lukas Alexander

AU - Steger, Christian

AU - Neffe, Ulrich

PY - 2019/10

Y1 - 2019/10

N2 - Designing secure systems is a complex task, particularly for designers who are no security experts. Cyber security plays a key role in embedded systems, especially for the domain of the Internet of Things (IoT). IoT systems of this kind are becoming increasingly important in daily life as they simplify various tasks. They are usually small, either embedded into bigger systems or battery driven, and perform monitoring or one shot tasks. Thus, they are subject to manifold constraints in terms of performance, power consumption, chip area, etc. As they are continuously connected to the internet and utilize our private data to perform their tasks, they are interesting for potential attackers. Cyber security thus plays an important role for the design of an IoT system. As the usage of security measures usually increases both computation time, as well as power consumption, a conflict between these constraints must be solved. For the designers of such systems, balancing these constraints constitutes a highly complex task. In this paper we propose a novel approach for considering possible security attacks on embedded systems, simplifying the consideration of security requirements immediately at the start of the design process. We introduce a security aware design space exploration framework which based on an architectural, behavioral and security attack description, finds the optimal design for IoT systems. We also demonstrate the feasibility and the benefits of our framework based on a door access system use case.

AB - Designing secure systems is a complex task, particularly for designers who are no security experts. Cyber security plays a key role in embedded systems, especially for the domain of the Internet of Things (IoT). IoT systems of this kind are becoming increasingly important in daily life as they simplify various tasks. They are usually small, either embedded into bigger systems or battery driven, and perform monitoring or one shot tasks. Thus, they are subject to manifold constraints in terms of performance, power consumption, chip area, etc. As they are continuously connected to the internet and utilize our private data to perform their tasks, they are interesting for potential attackers. Cyber security thus plays an important role for the design of an IoT system. As the usage of security measures usually increases both computation time, as well as power consumption, a conflict between these constraints must be solved. For the designers of such systems, balancing these constraints constitutes a highly complex task. In this paper we propose a novel approach for considering possible security attacks on embedded systems, simplifying the consideration of security requirements immediately at the start of the design process. We introduce a security aware design space exploration framework which based on an architectural, behavioral and security attack description, finds the optimal design for IoT systems. We also demonstrate the feasibility and the benefits of our framework based on a door access system use case.

M3 - Paper

ER -