Abstract
Nowadays, embedded systems have been widely used in all types of application areas, some of which belong to the safety and reliability critical domains. The functional correctness and design robustness of the embedded systems involved in such domains are crucial for the safety of personal/enterprise property or even human lives. Thereby, a holistic design procedure that considers all the important design concerns is essential.
In this article, we approach embedded systems design from an integral perspective. We consider not only the classic real-time and quality of service requirements, but also the emerging security and power efficiency demands. Modern embedded systems are not any more developed for a fixed purpose, but instead designed for undertaking various processing requests. This leads to the concept of multimode embedded systems, in which the number and nature of active tasks change during runtime. Under dynamic situations, providing high performance along with various design concerns becomes a really difficult problem. Therefore, we propose a novel power-aware secure embedded systems design framework that efficiently solves the problem of runtime quality optimization with security and power constraints. The efficiency of our proposed techniques are evaluated in extensive experiments.
- Min Bao, A. Andrei, P. Eles, and Zebo Peng. 2009. On-line thermal aware dynamic voltage scaling for energy optimization with frequency/temperature dependency consideration. In Design Automation Conference (DAC). 490--495. Google ScholarDigital Library
- Alex Biryukov and Eyal Kushilevitz. 1998. Improved cryptanalysis of RC5. In Advances in Cryptology (EUROCRYPT). 85--99.Google Scholar
- Cisco. 2014. H.264 codec. Retrieved Feb. 27, 2015 from https://github.com/cisco/openh264.Google Scholar
- K. Deb, A. Pratap, S. Agarwal, and T. Meyarivan. 2002. A fast and elitist multiobjective genetic algorithm: NSGA-II. Evolutionary Computation 6 (2002), 182--197. Google ScholarDigital Library
- Jutta Degener and Carsten Borman. 1992. GSM 06.10. Retrieved Feb. 21, 2015 from http://www.quut.com/gsm/gsm-1.0.13.tar.gz.Google Scholar
- Catherine H. Gebotys. 2006. A table masking countermeasure for low-energy secure embedded systems. IEEE Transactions on VLSI Systems 14, (July 2006), 740--753. Google ScholarDigital Library
- Johan Hagman. 1997. Mp3 decoder. Retrieved March 1, 2015 from http://aminet.net/mus/play/mpeg3play.lha.Google Scholar
- Steven A. Hofmeyr, Stephanie Forrest, and Anil Somayaji. 1998. Intrusion detection using sequences of system calls. Journal of Computer Security 6 (1998), 151--180. Google ScholarDigital Library
- Pengcheng Huang, Orlando Moreira, Kees Goossens, and Anca Molnos. 2013. Throughput-constrained voltage and frequency scaling for real-time heterogeneous multiprocessors. In The 28th Annual ACM Symposium on Applied Computing (SAC’13). 1517--1524. Google ScholarDigital Library
- Chia-Mei Hung, Jian-Jia Chen, and Tei-Wei Kuo. 2006. Energy-efficient real-time task scheduling for a DVS system with a non-DVS processing element. In International Real-Time Systems Symposium (RTSS’06). 303--312. Google ScholarDigital Library
- Ondrej Hyncica, Pavel Kucera, Petr Honzik, and Petr Fiedler. 2011. Performance evaluation of symmetric cryptography in embedded systems. In International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS’11). 277--282.Google ScholarCross Ref
- Independent JPEG Group IJG. 1998. jpeg-6b. Retrieved Feb. 17, 2015 from https://quirkysoft.googlecode.com/files/jpegsrc.v6b.tar.gz.Google Scholar
- Ke Jiang, Lejla Batina, Petru Eles, and Zebo Peng. 2014. Robustness analysis of real-time scheduling against differential power analysis attacks. In IEEE Computer Society Annual Symposium on VLSI (ISVLSI’14). 450--455. Google ScholarDigital Library
- Ke Jiang, Petru Eles, and Zebo Peng. 2011. Optimization of message encryption for distributed embedded systems with real-time constraints. In 14th International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS’11). 243--248.Google ScholarCross Ref
- Ke Jiang, P. Eles, and Zebo Peng. 2012a. Co-design techniques for distributed real-time embedded systems with communication security constraints. In Design, Automation Test in Europe (DATE’12). 947--952. Google ScholarDigital Library
- Ke Jiang, Petru Eles, and Zebo Peng. 2013a. Optimization of secure embedded systems with dynamic task sets. In Design, Automation Test in Europe (DATE’13). Google ScholarDigital Library
- Ke Jiang, Petru Eles, Zebo Peng, and Wei Jiang. 2013b. Power-aware design of secure multimode real-time embedded systems with FPGA co-processors. In 21st International Conference on Real-Time Networks and Systems (RTNS’13).Google ScholarDigital Library
- Wei Jiang, Ke Jiang, and Yue Ma. 2012b. Resource allocation of security-critical tasks with statistically guaranteed energy constraint. In 18th International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA’12). 330--339. Google ScholarDigital Library
- Lars Knudsen and Willi Meier. 2001. Correlations in RC6 with a reduced number of rounds. In Fast Software Encryption, 94--108. Google ScholarDigital Library
- Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, and others. 2010. Experimental security analysis of a modern automobile. In 2010 IEEE Symposium on Security and Privacy (SP’10). IEEE, 447--462. Google ScholarDigital Library
- Wenke Lee, S. J. Stolfo, and K. W. Mok. 1999. A data mining framework for building intrusion detection models. In 1999 IEEE Symposium on Security and Privacy. 120--132.Google Scholar
- Man Lin, Li Xu, L. T. Yang, Xiao Qin, Nenggan Zheng, Zhaohui Wu, and Meikang Qiu. 2009. Static security optimization for real-time systems. IEEE Transactions on Industrial Informatics (II) (2009), 22--37.Google Scholar
- Jane W. S. Liu, Wei-Kuan Shih, Kwei-Jay Lin, Riccardo Bettati, and Jen-Yao Chung. 1994. Imprecise computations. Proceedings of the IEEE 82, 1 (1994), 83--94.Google ScholarCross Ref
- Jiqiang Lu, Orr Dunkelman, Nathan Keller, and Jongsung Kim. 2008. New impossible differential attacks on AES. In Progress in Cryptology. 279--293. Google ScholarDigital Library
- Andrew Lukefahr, Shruti Padmanabha, Reetuparna Das, Ronald Dreslinski, Jr., Thomas F. Wenisch, and Scott Mahlke. 2014. Heterogeneous microarchitectures trump voltage scaling for low-power cores. In 23rd International Conference on Parallel Architectures and Compilation. 237--250. Google ScholarDigital Library
- Rabi N. Mahapatra and Wei Zhao. 2005. An energy-efficient slack distribution technique for multimode distributed real-time embedded systems. IEEE Transactions on Parallel and Distributed Systems 16, 7 (2005), 650--662. Google ScholarDigital Library
- S. M. Martin, K. Flautner, T. Mudge, and D. Blaauw. 2002. Combined dynamic voltage scaling and adaptive body biasing for lower power microprocessors under dynamic workloads. In International Conference on Computer Aided Design (ICCAD’02). 721--725. Google ScholarDigital Library
- Kosma Moczek. 2014. Minmea, a lightweight GPS NMEA 0183 parser library. Retrieved Feb. 27, 2015 from https://github.com/cloudyourcar/minmea.Google Scholar
- Jingqing Mu and Roman Lysecky. 2009. Autonomous hardware/software partitioning and voltage/frequency scaling for low-power embedded systems. ACM Transactions on Design Automation of Electronic Systems 15, 1, Article 2 (2009), 20 pages. Google ScholarDigital Library
- Hyunok Oh and Soonhoi Ha. 2002. Hardware-software cosynthesis of multimode multi-task embedded systems with real-time constraints. In 10th International Symposium on Hardware/Software Codesign(CODES02). ACM, New York, NY, 133--138. Google ScholarDigital Library
- Christof Paar and Jan Pelzl. 2010. Understanding Cryptography: A Textbook for Students and Practitioners. Springer. Google ScholarCross Ref
- Sangyoung Park, Jaehyun Park, Donghwa Shin, Yanzhi Wang, Qing Xie, M. Pedram, and Naehyuck Chang. 2013. Accurate modeling of the delay and energy overhead of dynamic voltage and frequency scaling in modern microprocessors. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 32, 5 (May 2013), 695--708. Google ScholarDigital Library
- Krutartha Patel and Sri Parameswaran. 2008. SHIELD: A software hardware design methodology for security and reliability of MPSoCs. In Design Automation Conference (DAC’08). 858--861. Google ScholarDigital Library
- Anuj Pathania, Qing Jiao, Alok Prakash, and Tulika Mitra. 2014. Integrated CPU-GPU power management for 3D mobile games. In Design Automation Conference (DAC’14). Google ScholarDigital Library
- Srivaths Ravi, Anand Raghunathan, and Srimat Chakradhar. 2004a. Tamper resistance mechanisms for secure embedded systems. International Conference on VLSI Design (2004), 605--611. Google ScholarDigital Library
- Srivaths Ravi, Anand Raghunathan, Paul Kocher, and Sunil Hattangady. 2004b. Security in embedded systems: Design challenges. ACM Transactions on Embedded Computing Systems 3 (2004), 461--491. Google ScholarDigital Library
- Ronald L. Rivest, M. J. B. Robshaw, R. Sidney, and Y. L. Yin. 1998. The RC6 block cipher. In First Advanced Encryption Standard (AES) Conference.Google Scholar
- S. Samii, P. Eles, Zebo Peng, and A. Cervin. 2009. Quality-driven synthesis of embedded multimode control systems. In Design Automation Conference (DAC’09). 864--869. Google ScholarDigital Library
- SAMSUNG Electronics Co. Ltd. 2004. S3C2440A 32-Bit CMOS Microcontroller User’s Manual Revision 1.Google Scholar
- Karen Scarfone and Peter Mell. 2007. Guide to intrusion detection and prevention systems (IDPS). NIST Special Publication (2007).Google Scholar
- Zili Shao, C. Xue, Q. Zhuge, M. Qiu, Bin Xiao, and E. H.-M. Sha. 2006. Security protection and checking for embedded system integration against buffer overflow attacks via hardware/software. IEEE Transactions on Computers (Apr. 2006), 443--453. Google ScholarDigital Library
- K. Tiri and I. Verbauwhede. 2004. A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation. In Design, Automation and Test in Europe Conference (DATE’04), 246--251. Google ScholarDigital Library
- Serge Vaudenay. 1996. On the weak keys of blowfish. In Fast Software Encryption, 27--32. Google ScholarDigital Library
- H. J. M. Veendrick. 1984. Short-circuit dissipation of static CMOS circuitry and its impact on the design of buffer circuits. IEEE Journal of Solid-State Circuits (SSC) 19, 4 (1984), 468--473.Google ScholarCross Ref
- Armin Wasicek, Patricia Derler, and Edward A. Lee. 2014. Aspect-oriented modeling of attacks in automotive cyber-physical systems. In The 51st Annual Design Automation Conference (DAC’14). 1--6. Google ScholarDigital Library
- Marko Wolf, André Weimerskirch, and Christof Paar. 2006. Secure in-vehicle communication. In Embedded Security in Cars. 95--109.Google Scholar
- Tao Xie and Xiao Qin. 2007. Improving security for periodic tasks in embedded systems through scheduling. ACM Transactions on Embedded Computing Systems 6, 3, Article 20. Google ScholarDigital Library
- Dit-Yan Yeung and Yuxin Ding. 2003. Host-based ID using dynamic and static behavioral models. Pattern Recognition 36 (2003), 229--243.Google ScholarCross Ref
- Man-Ki Yoon, S. Mohan, Jaesik Choi, Jung-Eun Kim, and Lui Sha. 2013. SecureCore: A multicore-based intrusion detection architecture for real-time embedded systems. In 2013 IEEE 19th Real-Time and Embedded Technology and Applications Symposium (RTAS’13). 21--32. Google ScholarDigital Library
- Wentao Zhang, Wenling Wu, and Dengguo Feng. 2007. New results on impossible differential cryptanalysis of reduced AES. In Information Security and Cryptology (ICISC). 239--250. Google ScholarDigital Library
- Eckart Zitzler. 2001. Hypervolume metric calculation. Retrieved Aug. 21, 2014 from ftp://ftp.tik.ee.ethz.ch/pub/people/zitzler/hypervol.c.Google Scholar
- Eckart Zitzler and Lothar Thiele. 1998. Multiobjective optimization using evolutionary algorithms—A comparative case study. In Conference on Parallel Problem Solving from Nature (PPSN V). 292--301. Google ScholarDigital Library
Index Terms
- Power-Aware Design Techniques of Secure Multimode Embedded Systems
Recommendations
Trustworthy ICs for secure embedded computing
The design of secure and trusted embedded systems has recently drawn enormous attention from system-design practitioners. A secure system is only as strong as the weakest link. Therefore, any security functions implemented in an embedded system must be ...
Exploiting application locality to design low-complexity, highly performing, and power-aware embedded classifiers
Temporal and spatial locality of the inputs, i.e., the property allowing a classifier to receive the same samples over time-or samples belonging to a neighborhood-with high probability, can be translated into the design of embedded classifiers. The ...
Security challenges in embedded systems
Special section on ESTIMedia'12, LCTES'11, rigorous embedded systems design, and multiprocessor system-on-chip for cyber-physical systemsEmbedded systems security is a significant requirement in emerging environments, considering the increasing deployment of embedded systems in several application domains. The large number of deployed embedded systems, their limited resources and their ...
Comments