2019 Forum for Specification and Design Languages (FDL) 2019
DOI: 10.1109/fdl.2019.8876944
|View full text |Cite
|
Sign up to set email alerts
|

Security Driven Design Space Exploration for Embedded Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…To the best of our knowledge, only the works of References [31,32] and Reference [33] are similar to what we propose in terms of aiming at incorporating security as an objective that can be traded off with other objectives in the process of early DSE. In References [31,32], the authors introduce an UML-based approach in which application security requirements can be described together with security 'capabilities'-in addition to other extra-functional aspects such as performance and power consumption-of system components stored in a library.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…To the best of our knowledge, only the works of References [31,32] and Reference [33] are similar to what we propose in terms of aiming at incorporating security as an objective that can be traded off with other objectives in the process of early DSE. In References [31,32], the authors introduce an UML-based approach in which application security requirements can be described together with security 'capabilities'-in addition to other extra-functional aspects such as performance and power consumption-of system components stored in a library.…”
Section: Related Workmentioning
confidence: 99%
“…This then allows for a DSE process during which the application requirements are matched with the component capabilities. The very recent work of Reference [33] introduces a novel DSE framework that allows for considering security constraints, in the form of attack scenarios, and attack mitigations, in the form of security tasks. Based on the descriptions of the system's functionality and architecture, possible attacks, and known mitigation techniques, the framework tries to find the optimal design for an embedded system.…”
Section: Related Workmentioning
confidence: 99%
“…Ensuring security of embedded system need a thorough consideration of all security constraints as well as the limited resources of power consumption and performances. Mitigation solutions should be implemented based on the functionalities, architectures, and potential attacks of systems [121].…”
Section: Networkingmentioning
confidence: 99%