Embedded Systems Design Space Exploration Under Security Constraints

Embedded Systems Design Space Exploration Under Security Constraints

Fateh Boutekkouk
Copyright: © 2022 |Volume: 13 |Issue: 1 |Pages: 32
ISSN: 1947-9301|EISSN: 1947-931X|EISBN13: 9781683181293|DOI: 10.4018/IJTD.300744
Cite Article Cite Article

MLA

Boutekkouk, Fateh. "Embedded Systems Design Space Exploration Under Security Constraints." IJTD vol.13, no.1 2022: pp.1-32. http://doi.org/10.4018/IJTD.300744

APA

Boutekkouk, F. (2022). Embedded Systems Design Space Exploration Under Security Constraints. International Journal of Technology Diffusion (IJTD), 13(1), 1-32. http://doi.org/10.4018/IJTD.300744

Chicago

Boutekkouk, Fateh. "Embedded Systems Design Space Exploration Under Security Constraints," International Journal of Technology Diffusion (IJTD) 13, no.1: 1-32. http://doi.org/10.4018/IJTD.300744

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Design space exploration (DSE) is a key activity in any embedded system design flow. With the remarkable increasing in the connectivity to the internet, embedded systems are becoming the target of different cyber-attacks. As security emerges as a major design concern, DSE should be aware of the security aspect at a higher level of abstraction. On the other hand and to our best knowledge, there is no a comprehensive survey on this topic, hence the need to establish a comprehensive survey for existing security-aware DSE approaches for embedded systems at the system level. To meet this objective, we first selected and summarized twenty-two pertinent works. They were analyzed based on a set of criteria. The outcomes of this survey are a set of recommendations that can help embedded systems designers to better dealing with security at system-level DSE stage. The presented survey ends by proposing some potential promising future trends that can be investigated by researchers to pursue the research in related topics.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.