Authors:
Alberto Ferrante
;
Jelena Milosevic
and
Marija Janjušević
Affiliation:
University of Lugano, Switzerland
Keyword(s):
Security, Design Methodology, Embedded Systems, Security Metric, Metric, AHP.
Related
Ontology
Subjects/Areas/Topics:
Cloud Computing
;
Data and Application Security and Privacy
;
Information and Systems Security
;
Information Assurance
;
Management of Computing Security
;
Security and Privacy in Mobile Systems
;
Security and Privacy in Pervasive/Ubiquitous Computing
;
Security Deployment
;
Security Engineering
;
Security in Information Systems
;
Security Metrics and Measurement
;
Security Requirements
;
Service and Systems Design and Qos Network Security
;
Services Science
Abstract:
Designing an embedded system is a complex process that involves working both on hardware and on software. Designers often optimize the systems that they design for specific applications; an optimal system is the one that can execute the desired set of applications with the required performances at the lowest possible cost. Cost may be expressed in different ways such as, for example, energy consumption and/or silicon area. Security is being, in the common practice, disregarded during this phase and inserted in later stages of the design process, thus obtaining non optimal and/or non safe systems.
In this paper we propose a design methodology for embedded systems that integrate the choice of suitable design solutions into the early stages of the design process. The main purpose of this methodology is to provide a way to evaluate security as an additional optimization parameter. Along with a description of the methodology, in this paper we also show a case study that explains how the m
ethodology can be applied and that proves its effectiveness.
(More)