Please use this identifier to cite or link to this item:
|Title:||Security is an architectural design constraint||Authors:||Ravi, Prasanna
Gupta, Sourav Sen
|Keywords:||Engineering::Computer science and engineering||Issue Date:||2019||Source:||Ravi, P., Najm, Z., Bhasin, S., Khairallah, M., Gupta, S. S. & Chattopadhyay, A. (2019). Security is an architectural design constraint. Microprocessors and Microsystems, 68, 17-27. https://dx.doi.org/10.1016/j.micpro.2019.03.003||Journal:||Microprocessors and Microsystems||Abstract:||In state-of-the-art design paradigm, time, space and power efficiency are considered the primary design constraints. Quite often, this approach adversely impacts the security of the overall system, especially when security is adopted as a countermeasure after some vulnerability is identified. In this position paper, we motivate the idea that security should also be considered as an architectural design constraint in addition to time, space and power. We show that security and efficiency objectives along the three design axes of time, space and power are in fact tightly coupled while identifying that security stands in direct contrast with them across all layers of architectural design. We attempt to prove our case utilizing a proof-by-evidence approach wherein we refer to various works across literature that explicitly imply the eternal conflict between security and efficiency. Thus, security has to be treated as a design constraint from the very beginning. Additionally, we advocate a security-aware design flow starting from the choice of cryptographic primitives, protocols and system design.||URI:||https://hdl.handle.net/10356/147415||ISSN:||0141-9331||DOI:||10.1016/j.micpro.2019.03.003||Rights:||© 2019 Elsevier B.V. All rights reserved.||Fulltext Permission:||none||Fulltext Availability:||No Fulltext|
|Appears in Collections:||TL Journal Articles|
Updated on Sep 26, 2022
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.