SwePub
Sök i LIBRIS databas

  Extended search

WFRF:(Mottola Luca)
 

Search: WFRF:(Mottola Luca) > (2020-2024) > On Securing Persist...

On Securing Persistent State in Intermittent Computing

Asad, H. A. (author)
Uppsala universitet,Institutionen för informationsteknologi
Wouters, Erik Henricus (author)
KTH,KTH Royal Institute of Technology, Sweden
Bhatti, N. A. (author)
Air University, Pakistan
show more...
Mottola, Luca (author)
Uppsala universitet,RISE,Datavetenskap,Datorarkitektur och datorkommunikation
Voigt, Thiemo (author)
Uppsala universitet,RISE,Datavetenskap,Uppsala University, Sweden,Datorarkitektur och datorkommunikation,Datorteknik
show less...
 (creator_code:org_t)
2020-11-16
2020
English.
In: ENSsys 2020 - Proceedings of the 8th International Workshop on Energy Harvesting and Energy-Neutral Sensing Systems. - New York, NY, USA : Association for Computing Machinery, Inc. ; , s. 8-14, s. 8-14, s. 8-14
  • Conference paper (peer-reviewed)
Abstract Subject headings
Close  
  • We present the experimental evaluation of different security mechanisms applied to persistent state in intermittent computing. Whenever executions become intermittent because of energy scarcity, systems employ persistent state on non-volatile memories (NVMs) to ensure forward progress of applications. Persistent state spans operating system and network stack, as well as applications. While a device is off recharging energy buffers, persistent state on NVMs may be subject to security threats such as stealing sensitive information or tampering with configuration data, which may ultimately corrupt the device state and render the system unusable. Based on modern platforms of the Cortex M*series, we experimentally investigate the impact on typical intermittent computing workloads of different means to protect persistent state, including software and hardware implementations of staple encryption algorithms and the use of ARM TrustZone protection mechanisms. Our results indicate that i) software implementations bear a significant overhead in energy and time, sometimes harming forward progress, but also retaining the advantage of modularity and easier updates; ii) hardware implementations offer much lower overhead compared to their software counterparts, but require a deeper understanding of their internals to gauge their applicability in given application scenarios; and iii) TrustZone shows almost negligible overhead, yet it requires a different memory management and is only effective as long as attackers cannot directly access the NVMs.

Subject headings

TEKNIK OCH TEKNOLOGIER  -- Elektroteknik och elektronik -- Datorsystem (hsv//swe)
ENGINEERING AND TECHNOLOGY  -- Electrical Engineering, Electronic Engineering, Information Engineering -- Computer Systems (hsv//eng)
NATURVETENSKAP  -- Data- och informationsvetenskap -- Datavetenskap (hsv//swe)
NATURAL SCIENCES  -- Computer and Information Sciences -- Computer Sciences (hsv//eng)
NATURVETENSKAP  -- Data- och informationsvetenskap -- Datorteknik (hsv//swe)
NATURAL SCIENCES  -- Computer and Information Sciences -- Computer Engineering (hsv//eng)

Keyword

embedded security
intermittent computing
transiently-powered embedded system
Cryptography
Data storage equipment
Energy harvesting
Application scenario
Encryption algorithms
Experimental evaluation
Hardware implementations
Protection mechanisms
Sensitive informations
Software and hardwares
Software implementation
Application programs

Publication and Content Type

ref (subject category)
kon (subject category)

Find in a library

To the university's database

Search outside SwePub

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view