Skip to main content

2018 | OriginalPaper | Buchkapitel

6. Hybrid Mapping for Increased Security

verfasst von : Andreas Weichslgartner, Stefan Wildermann, Michael Glaß, Jürgen Teich

Erschienen in: Invasive Computing for Mapping Parallel Programs to Many-Core Architectures

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this chapter, it is shown that the introduced hybrid application mapping can also be utilized to increase security in heterogeneous many-core systems. In the case of security, it is proposed to use the concept of spatial isolation enabled by invasion to close side channels. This requires a shift from the optimization criteria in the previous chapter. There, the hop distance between tasks is maximized to increase the run-time embeddability as one constraint graph typically allows for many concrete mappings. For spatial isolation, so-called shapes as a second intermediate representation besides the constraint graph are introduced. As these shapes represent tiles and adjacent routers, no communication constraints have to be evaluated during run-time mapping. This eases the run-time mapping and transforms it basically to a constrained 2D packing problem. Consequently, fast heuristics as well as SAT-based solvers which choose fitting shape incarnations from each application concurrently may be applied.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Fußnoten
1
There exists also source routing where the next hop is decoded in a packet header instead of a routing table. As both algorithms consider all possible minimal routes, the proposed optimizations for table-based routing can also be applied for source routing.
 
2
Even tiles which are adjacent to routers that are used for routing and do not execute any tasks are part of the shape.
 
3
Note, while the execution times are significant lower than in Sect. 5.​5.​6, the system utilization, i.e., number of mapped applications, may be less because of the strong isolation.
 
4
However, the number of shape incarnations can be cubic to the architecture size, see Algorithm 6.1.
 
Literatur
9.
Zurück zum Zitat Drescher G, Erhardt C, Freiling F, Götzfried J, Lohmann D, Maene P, Müller T, Verbauwhede I, Weichslgartner A, Wildermann S (2016) Providing security on demand using invasive computing. It Inf Technol 58(6):281–295. https://doi.org/10.1515/itit-2016-0032 Drescher G, Erhardt C, Freiling F, Götzfried J, Lohmann D, Maene P, Müller T, Verbauwhede I, Weichslgartner A, Wildermann S (2016) Providing security on demand using invasive computing. It Inf Technol 58(6):281–295. https://​doi.​org/​10.​1515/​itit-2016-0032
10.
Zurück zum Zitat Goens A, Khasanov R, Castrillon J, Hähnel M, Smejkal T, Härtig H (2017) Tetris: A multi-application run-time system for predictable execution of static mappings. In: Proceedings of the conference on languages, compilers and tools for embedded systems (SCOPES), ACM, pp 11–20. https://doi.org/10.1145/3078659.3078663 Goens A, Khasanov R, Castrillon J, Hähnel M, Smejkal T, Härtig H (2017) Tetris: A multi-application run-time system for predictable execution of static mappings. In: Proceedings of the conference on languages, compilers and tools for embedded systems (SCOPES), ACM, pp 11–20. https://​doi.​org/​10.​1145/​3078659.​3078663
11.
Zurück zum Zitat Graf S, Reimann F, Glaß M, Teich J (2014) Towards scalable symbolic routing for multi-objective networked embedded system design and optimization. In: Proceedings of the conference on hardware/software codesign and system synthesis (CODES+ISSS), ACM, pp 2:1–2:10. https://doi.org/10.1145/2656075.2656102 Graf S, Reimann F, Glaß M, Teich J (2014) Towards scalable symbolic routing for multi-objective networked embedded system design and optimization. In: Proceedings of the conference on hardware/software codesign and system synthesis (CODES+ISSS), ACM, pp 2:1–2:10. https://​doi.​org/​10.​1145/​2656075.​2656102
12.
Zurück zum Zitat Heisswolf J, Weichslgartner A, Zaib A, Konig R, Wild T, Herkersdorf A, Teich J, Becker J (2013) Hardware supported adaptive data collection for networks on chip. In: International parallel and distributed processing symposium workshops PhD forum (IPDPSW), IEEE, pp 153–162. https://doi.org/10.1109/IPDPSW.2013.124 Heisswolf J, Weichslgartner A, Zaib A, Konig R, Wild T, Herkersdorf A, Teich J, Becker J (2013) Hardware supported adaptive data collection for networks on chip. In: International parallel and distributed processing symposium workshops PhD forum (IPDPSW), IEEE, pp 153–162. https://​doi.​org/​10.​1109/​IPDPSW.​2013.​124
13.
Zurück zum Zitat Heisswolf J, Zaib A, Weichslgartner A, König R, Wild T, Teich J, Herkersdorf A, Becker J (2013) Virtual networks – distributed communication resource management. Trans Reconfigurable Technol Syst (TRETS) 6(2):8:1–8:14. https://doi.org/10.1145/2492186 Heisswolf J, Zaib A, Weichslgartner A, König R, Wild T, Teich J, Herkersdorf A, Becker J (2013) Virtual networks – distributed communication resource management. Trans Reconfigurable Technol Syst (TRETS) 6(2):8:1–8:14. https://​doi.​org/​10.​1145/​2492186
16.
Zurück zum Zitat Kocher PC (1996) Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Proceedings of the annual international cryptology conference (CRYPTO), Springer, Lecture Notes in Computer Science, vol 1109, pp 104–113. https://doi.org/10.1007/3-540-68697-5_9 Kocher PC (1996) Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Proceedings of the annual international cryptology conference (CRYPTO), Springer, Lecture Notes in Computer Science, vol 1109, pp 104–113. https://​doi.​org/​10.​1007/​3-540-68697-5_​9
21.
Zurück zum Zitat Pagani S, Bauer L, Chen Q, Glocker E, Hannig F, Herkersdorf A, Khdr H, Pathania A, Schlichtmann U, Schmitt-Landsiedel D, Sagi M, Sousa E, Wagner P, Wenzel V, Wild T, Henkel J (2016) Dark silicon management: An integrated and coordinated cross-layer approach. Inf Technol 58(6):297–307. https://doi.org/10.1515/itit-2016-0028 Pagani S, Bauer L, Chen Q, Glocker E, Hannig F, Herkersdorf A, Khdr H, Pathania A, Schlichtmann U, Schmitt-Landsiedel D, Sagi M, Sousa E, Wagner P, Wenzel V, Wild T, Henkel J (2016) Dark silicon management: An integrated and coordinated cross-layer approach. Inf Technol 58(6):297–307. https://​doi.​org/​10.​1515/​itit-2016-0028
22.
Zurück zum Zitat Palesi M, Holsmark R, Kumar S, Catania V (2006) A methodology for design of application specific deadlock-free routing algorithms for NoC systems. In: Proceedings of the conference on hardware/software codesign and system synthesis (CODES+ISSS), ACM, pp 142–147. https://doi.org/10.1145/1176254.1176289 Palesi M, Holsmark R, Kumar S, Catania V (2006) A methodology for design of application specific deadlock-free routing algorithms for NoC systems. In: Proceedings of the conference on hardware/software codesign and system synthesis (CODES+ISSS), ACM, pp 142–147. https://​doi.​org/​10.​1145/​1176254.​1176289
25.
Zurück zum Zitat Teich J, Fekete SP, Schepers J (1999) Compile-time optimization of dynamic hardware reconfigurations. In: Proceeding of the international conference on parallel and distributed processing techniques and applications (PDPTA), pp 1097–1103 Teich J, Fekete SP, Schepers J (1999) Compile-time optimization of dynamic hardware reconfigurations. In: Proceeding of the international conference on parallel and distributed processing techniques and applications (PDPTA), pp 1097–1103
28.
Zurück zum Zitat Weichslgartner A, Wildermann S, Götzfried J, Freiling F, Glaß M, Teich J (2016) Design-time/run-time mapping of security-critical applications in heterogeneous MPSoCs. In: Proceedings of the conference on languages, compilers and tools for embedded systems (SCOPES), ACM, pp 153–162. https://doi.org/10.1145/2906363.2906370 Weichslgartner A, Wildermann S, Götzfried J, Freiling F, Glaß M, Teich J (2016) Design-time/run-time mapping of security-critical applications in heterogeneous MPSoCs. In: Proceedings of the conference on languages, compilers and tools for embedded systems (SCOPES), ACM, pp 153–162. https://​doi.​org/​10.​1145/​2906363.​2906370
Metadaten
Titel
Hybrid Mapping for Increased Security
verfasst von
Andreas Weichslgartner
Stefan Wildermann
Michael Glaß
Jürgen Teich
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-7356-4_6

Neuer Inhalt