Towards decentralized system-level security for MPSoC-based embedded applications

B Tan, M Biglari-Abhari, Z Salcic - Journal of Systems Architecture, 2017 - Elsevier
With the increasing connectivity and complexity of embedded systems, security issues have
become a key consideration in design. In this paper, we propose a decentralized system …

*‐Predictable MPSoC execution of real‐time control applications using invasive computing

M Brand, M Witterauf, É Sousa… - Concurrency and …, 2021 - Wiley Online Library
The fulfillment of non‐functional requirements like timing or energy consumption is of utmost
importance in many embedded systems and respective applications. Especially, with the …

Invasive Computing for predictability of multiple non-functional properties: A cyber-physical system case study

É Sousa, M Witterauf, M Brand… - 2018 IEEE 29th …, 2018 - ieeexplore.ieee.org
The predictability of non-functional execution qualities is of utmost importance for the
successful introduction of multi-core architectures in embedded systems requiring …

Operating-System Support for Efficient Fine-Grained Concurrency in Applications

C Erhardt - 2020 - informatik.uni-erlangen.de
Ph.D. theses Friedrich-Alexander-Universität Univis Search Deutsch FAU-Logo Techn. Fakultät
Willkommen am Department Informatik FAU-Logo Logo I4 Department of Computer Science 4 …

[PDF][PDF] 10 Invasive Run-Time Support System (iRTSS)

L Bauer, J Henkel, T Hönig… - … Henkel/Herkersdorf (Eds … - opus4.kobv.de
Invasive programs, as well as hardware designed specifically to run them, need an
operating system that does not make applications pay for resources, functions or features …

Invasive Computing

A Weichslgartner, S Wildermann, M Glaß… - Invasive Computing for …, 2018 - Springer
As this book originates in the context of invasive computing, this chapter gives an overview
of the invasive computing paradigm and its realization in software and hardware. It starts …

Hybrid Mapping for Increased Security

A Weichslgartner, S Wildermann, M Glaß… - Invasive Computing for …, 2018 - Springer
In this chapter, it is shown that the introduced hybrid application mapping can also be
utilized to increase security in heterogeneous many-core systems. In the case of security, it …

[引用][C] Adaptive Address-Space Management for Resource-Aware Applications

G Drescher - 2021 - Dissertation, Erlangen, Friedrich …

[引用][C] Trusted Systems in Untrusted Environments: Protecting against Strong Attackers

S vor starken Angreifern, J Götzfried

[引用][C] Improving the Security of Multiprocessor-Based Embedded System Designs

PS Tan - 2018 - ResearchSpace@ Auckland