Conference paper Open Access
Siavvas, Miltiadis;
Marantos, Charalampos;
Papadopoulos, Lazaros;
Kehagias, Dionysios;
Soudris, Dimitrios;
Tzovaras, Dimitrios
{ "files": [ { "links": { "self": "https://zenodo.org/api/files/8c41d362-9b0a-4dc6-9bfd-64b0fe4f61ec/CEISEE_2019___Security_vs_Energy_Consumption___Joint_Paper.pdf" }, "checksum": "md5:01d3a4d93e583c0a740bcc4070fbcf52", "bucket": "8c41d362-9b0a-4dc6-9bfd-64b0fe4f61ec", "key": "CEISEE_2019___Security_vs_Energy_Consumption___Joint_Paper.pdf", "type": "pdf", "size": 607616 } ], "owners": [ 75254 ], "doi": "10.5281/zenodo.3379867", "stats": { "version_unique_downloads": 62.0, "unique_views": 84.0, "views": 93.0, "version_views": 93.0, "unique_downloads": 62.0, "version_unique_views": 84.0, "volume": 43748352.0, "version_downloads": 72.0, "downloads": 72.0, "version_volume": 43748352.0 }, "links": { "doi": "https://doi.org/10.5281/zenodo.3379867", "conceptdoi": "https://doi.org/10.5281/zenodo.3379866", "bucket": "https://zenodo.org/api/files/8c41d362-9b0a-4dc6-9bfd-64b0fe4f61ec", "conceptbadge": "https://zenodo.org/badge/doi/10.5281/zenodo.3379866.svg", "html": "https://zenodo.org/record/3379867", "latest_html": "https://zenodo.org/record/3379867", "badge": "https://zenodo.org/badge/doi/10.5281/zenodo.3379867.svg", "latest": "https://zenodo.org/api/records/3379867" }, "conceptdoi": "10.5281/zenodo.3379866", "created": "2019-08-28T11:29:09.762535+00:00", "updated": "2020-01-20T17:11:20.566418+00:00", "conceptrecid": "3379866", "revision": 5, "id": 3379867, "metadata": { "access_right_category": "success", "doi": "10.5281/zenodo.3379867", "version": "1.0", "language": "eng", "title": "On the Relationship between Software Security and Energy Consumption", "license": { "id": "CC-BY-4.0" }, "related_identifiers": [ { "scheme": "doi", "identifier": "10.5281/zenodo.3379866", "relation": "isVersionOf" } ], "relations": { "version": [ { "count": 1, "index": 0, "parent": { "pid_type": "recid", "pid_value": "3379866" }, "is_last": true, "last_child": { "pid_type": "recid", "pid_value": "3379867" } } ] }, "grants": [ { "code": "780572", "links": { "self": "https://zenodo.org/api/grants/10.13039/501100000780::780572" }, "title": "Software Development toolKit for Energy optimization and technical Debt elimination", "acronym": "SDK4ED", "program": "H2020", "funder": { "doi": "10.13039/501100000780", "acronyms": [], "name": "European Commission", "links": { "self": "https://zenodo.org/api/funders/10.13039/501100000780" } } } ], "keywords": [ "software security", "energy consumption", "performance", "trade offs" ], "publication_date": "2019-08-28", "creators": [ { "orcid": "0000-0002-3251-8723", "affiliation": "Imperial College London, London, United Kingdom", "name": "Siavvas, Miltiadis" }, { "affiliation": "National Technical University of Athens, Greece", "name": "Marantos, Charalampos" }, { "affiliation": "National Technical University of Athens, Greece", "name": "Papadopoulos, Lazaros" }, { "affiliation": "Centre for Research and Technology Hellas, Thessaloniki, Greece", "name": "Kehagias, Dionysios" }, { "affiliation": "National Technical University of Athens, Greece", "name": "Soudris, Dimitrios" }, { "affiliation": "Centre for Research and Technology Hellas, Thessaloniki, Greece", "name": "Tzovaras, Dimitrios" } ], "meeting": { "acronym": "CEISEE19", "url": "http://ceisee.ceisee.com/", "dates": "30-31 May 2019", "place": "Lisbon - Caparica, Portugal", "title": "15th China-Europe International Symposium on Software Engineering Education (CEISEE19)" }, "access_right": "open", "resource_type": { "subtype": "conferencepaper", "type": "publication", "title": "Conference paper" }, "description": "<p>Mitigating software vulnerabilities typically requires source code refactorings for implementing necessary security mechanisms. These mechanisms, although they enhance software security, they usually execute a large number of instructions, adding a performance/energy penalty to the overall application. Conversely, source code transformations are extensively performed by developers in order to improve the runtime quality of applications, in terms of performance and energy efficiency. These transformations may indirectly affect software security, since they may lead to the introduction of new security issues. In this work, we empirically examine the impact of source code-level energy/performance optimizations on software security and vice versa. The preliminary results of the empirical study suggest that the energy-related transformations may indirectly affect software security, whereas the incremental addition of security mechanisms may lead to an important increase in the energy consumption of software applications.</p>" } }
All versions | This version | |
---|---|---|
Views | 93 | 93 |
Downloads | 72 | 72 |
Data volume | 43.7 MB | 43.7 MB |
Unique views | 84 | 84 |
Unique downloads | 62 | 62 |