Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/147415
Full metadata record
DC FieldValueLanguage
dc.contributor.authorRavi, Prasannaen_US
dc.contributor.authorNajm, Zakariaen_US
dc.contributor.authorBhasin, Shivamen_US
dc.contributor.authorKhairallah, Mustafaen_US
dc.contributor.authorGupta, Sourav Senen_US
dc.contributor.authorChattopadhyay, Anupamen_US
dc.date.accessioned2021-04-08T05:12:58Z-
dc.date.available2021-04-08T05:12:58Z-
dc.date.issued2019-
dc.identifier.citationRavi, P., Najm, Z., Bhasin, S., Khairallah, M., Gupta, S. S. & Chattopadhyay, A. (2019). Security is an architectural design constraint. Microprocessors and Microsystems, 68, 17-27. https://dx.doi.org/10.1016/j.micpro.2019.03.003en_US
dc.identifier.issn0141-9331en_US
dc.identifier.other0000-0003-0201-3705-
dc.identifier.other0000-0002-6903-5127-
dc.identifier.other0000-0002-8818-6983-
dc.identifier.urihttps://hdl.handle.net/10356/147415-
dc.description.abstractIn state-of-the-art design paradigm, time, space and power efficiency are considered the primary design constraints. Quite often, this approach adversely impacts the security of the overall system, especially when security is adopted as a countermeasure after some vulnerability is identified. In this position paper, we motivate the idea that security should also be considered as an architectural design constraint in addition to time, space and power. We show that security and efficiency objectives along the three design axes of time, space and power are in fact tightly coupled while identifying that security stands in direct contrast with them across all layers of architectural design. We attempt to prove our case utilizing a proof-by-evidence approach wherein we refer to various works across literature that explicitly imply the eternal conflict between security and efficiency. Thus, security has to be treated as a design constraint from the very beginning. Additionally, we advocate a security-aware design flow starting from the choice of cryptographic primitives, protocols and system design.en_US
dc.language.isoenen_US
dc.relation.ispartofMicroprocessors and Microsystemsen_US
dc.rights© 2019 Elsevier B.V. All rights reserved.en_US
dc.subjectEngineering::Computer science and engineeringen_US
dc.titleSecurity is an architectural design constrainten_US
dc.typeJournal Articleen
dc.contributor.schoolSchool of Computer Science and Engineeringen_US
dc.contributor.schoolSchool of Physical and Mathematical Sciencesen_US
dc.contributor.researchTemasek Laboratories @ NTUen_US
dc.identifier.doi10.1016/j.micpro.2019.03.003-
dc.identifier.scopus2-s2.0-85065185667-
dc.identifier.volume68en_US
dc.identifier.spage17en_US
dc.identifier.epage27en_US
dc.subject.keywordsHardware Securityen_US
dc.subject.keywordsDigital Systemsen_US
item.fulltextNo Fulltext-
item.grantfulltextnone-
Appears in Collections:TL Journal Articles

Page view(s)

7
Updated on Apr 15, 2021

Google ScholarTM

Check

Altmetric


Plumx

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.