Prof. Gerhard Fohler
Stephanie Jung
Phone: +49 631 205 2086

Office Hours
Mon/Tue: 13:00-16:00
Wed-Fri: 08:00-11:00
You are here: RTS-Portal>>Publications


Search Publications


DREAMS: Secure Communication Between Resource Management Components in Networked Multi-Core Systems

Category: Conference
Author(s)Thomas Koller, Gautam Gala, Daniel Gracia Pérez, Christoph Ruland, Gerhard Fohler
SourceIEEE Conference on Open Systems, IEEE Computer Society, Best Paper Award.
Date Oct 2016


In mixed-criticality systems, resource management services are required to recognize and fulfill system wide high-level constraints, e.g., end-to-end deadlines. This is not possible through individual resources in isolation. Instead, a system-wide view is necessary which requires system-wide decisions. In the European FP7 project DREAMS, services for system-wide adaptability of mixed-criticality applications consuming several resources are provided via a hierarchical resource management. The resource management is a promising target for a passive as well as an active attacker since it deals with critical information of the system. The fact of having the authority to actively take decisions on resource allocation makes it an interesting target. Therefore, security mechanisms are required to ensure an adequate protection of the system's resource management. This paper introduces the DREAMS secure resource management services, specifically secure communication between the resource managers. Furthermore, the resource management infrastructure is analyzed with respect to possible attacks and suitable countermeasures are discussed. A security library is developed in accordance to the identified countermeasures and implemented as a proof of concept.


Upcoming Events
Currently no events
Latest News:
31.01.20 10:29
Prof.Marcello Cinque, University of Naples Federico II, will be visiting and giving a number of...

31.07.19 10:29
Our paper titled "Minimizing Side-Channel Attack Vulnerability via Schedule...

05.06.19 11:15
Our paper titled "System Calls Instrumentation for Intrusion Detection in Embedded...

All News