Affiliation:
1. Virginia Tech, Blacksburg, Virginia, USA
2. Worcester Polytechnic University, Worcester, Massachusetts, USA
Abstract
Intermittent computing derives its name from the intermittent character of the power source used to drive the computing, typically an energy harvester of ambient energy sources. Intermittent computing is characterized by frequent transitions between the powered and the non-powered state. To enable the processor to quickly recover from unexpected power loss, regular checkpoints store the run-time state of the program, including variables, control information, and machine state. In sensitive applications such as logged measurements, checkpoints must be secured against tamper and replay. We investigate the overhead of creating, securing, and restoring checkpoints with respect to the application. We propose a configurable checkpoint security setting that leverages application properties to reduce overhead of checkpoint security and implement the same using a secure checkpointing protocol. We discuss a prototype implementation for a FRAM-based micro-controller, and we characterize the cost of adding and configuring security to traditional checkpointing using a suite of embedded benchmark applications.
Publisher
Association for Computing Machinery (ACM)
Subject
Hardware and Architecture,Software
Reference40 articles.
1. Texas Instruments. 2016. MSP430FR5994 LaunchPad Development Kit (MSP-EXP430FR5994). Technical Report. Texas Instruments. Retrieved from http://www.ti.com/lit/ug/slau678a/slau678a.pdf.
2. Efficient intermittent computing with differential checkpointing
3. RESTOP: Retaining External Peripheral State in Intermittently-Powered Sensor Systems
4. On Securing Persistent State in Intermittent Computing
5. GIFT-COFB v1.0;Banik Subhadeep;Submission to Round 2 of the NIST Lightweight Cryptography project,2019
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Secure Intermittent Computing with ARM TrustZone on the Cortex-M;2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW);2024-07-08
2. Hitchhiker's Guide to Secure Checkpointing on Energy-Harvesting Systems;Proceedings of the 11th International Workshop on Energy Harvesting & Energy-Neutral Sensing Systems;2023-11-12
3. Application-aware Energy Attack Mitigation in the Battery-less Internet of Things;Proceedings of the Int'l ACM Symposium on Mobility Management and Wireless Access;2023-10-30