Conference paper Open Access

On the Relationship between Software Security and Energy Consumption

Siavvas, Miltiadis; Marantos, Charalampos; Papadopoulos, Lazaros; Kehagias, Dionysios; Soudris, Dimitrios; Tzovaras, Dimitrios


MARC21 XML Export

<?xml version='1.0' encoding='UTF-8'?>
<record xmlns="http://www.loc.gov/MARC21/slim">
  <leader>00000nam##2200000uu#4500</leader>
  <datafield tag="041" ind1=" " ind2=" ">
    <subfield code="a">eng</subfield>
  </datafield>
  <datafield tag="653" ind1=" " ind2=" ">
    <subfield code="a">software security</subfield>
  </datafield>
  <datafield tag="653" ind1=" " ind2=" ">
    <subfield code="a">energy consumption</subfield>
  </datafield>
  <datafield tag="653" ind1=" " ind2=" ">
    <subfield code="a">performance</subfield>
  </datafield>
  <datafield tag="653" ind1=" " ind2=" ">
    <subfield code="a">trade offs</subfield>
  </datafield>
  <controlfield tag="005">20200120171120.0</controlfield>
  <controlfield tag="001">3379867</controlfield>
  <datafield tag="711" ind1=" " ind2=" ">
    <subfield code="d">30-31 May 2019</subfield>
    <subfield code="g">CEISEE19</subfield>
    <subfield code="a">15th China-Europe International Symposium on Software Engineering Education (CEISEE19)</subfield>
    <subfield code="c">Lisbon - Caparica, Portugal</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">National Technical University of Athens, Greece</subfield>
    <subfield code="a">Marantos, Charalampos</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">National Technical University of Athens, Greece</subfield>
    <subfield code="a">Papadopoulos, Lazaros</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">Centre for Research and Technology Hellas, Thessaloniki, Greece</subfield>
    <subfield code="a">Kehagias, Dionysios</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">National Technical University of Athens, Greece</subfield>
    <subfield code="a">Soudris, Dimitrios</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">Centre for Research and Technology Hellas, Thessaloniki, Greece</subfield>
    <subfield code="a">Tzovaras, Dimitrios</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
    <subfield code="s">607616</subfield>
    <subfield code="z">md5:01d3a4d93e583c0a740bcc4070fbcf52</subfield>
    <subfield code="u">https://zenodo.org/record/3379867/files/CEISEE_2019___Security_vs_Energy_Consumption___Joint_Paper.pdf</subfield>
  </datafield>
  <datafield tag="542" ind1=" " ind2=" ">
    <subfield code="l">open</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
    <subfield code="y">Conference website</subfield>
    <subfield code="u">http://ceisee.ceisee.com/</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="c">2019-08-28</subfield>
  </datafield>
  <datafield tag="909" ind1="C" ind2="O">
    <subfield code="p">openaire</subfield>
    <subfield code="o">oai:zenodo.org:3379867</subfield>
  </datafield>
  <datafield tag="100" ind1=" " ind2=" ">
    <subfield code="u">Imperial College London, London, United Kingdom</subfield>
    <subfield code="0">(orcid)0000-0002-3251-8723</subfield>
    <subfield code="a">Siavvas, Miltiadis</subfield>
  </datafield>
  <datafield tag="245" ind1=" " ind2=" ">
    <subfield code="a">On the Relationship between Software Security and Energy Consumption</subfield>
  </datafield>
  <datafield tag="536" ind1=" " ind2=" ">
    <subfield code="c">780572</subfield>
    <subfield code="a">Software Development toolKit for Energy optimization and technical Debt elimination</subfield>
  </datafield>
  <datafield tag="540" ind1=" " ind2=" ">
    <subfield code="u">https://creativecommons.org/licenses/by/4.0/legalcode</subfield>
    <subfield code="a">Creative Commons Attribution 4.0 International</subfield>
  </datafield>
  <datafield tag="650" ind1="1" ind2="7">
    <subfield code="a">cc-by</subfield>
    <subfield code="2">opendefinition.org</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
    <subfield code="a">&lt;p&gt;Mitigating software vulnerabilities typically requires source code refactorings for implementing necessary security mechanisms. These mechanisms, although they enhance software security, they usually execute a large number of instructions, adding a performance/energy penalty to the overall application. Conversely, source code transformations are extensively performed by developers in order to improve the runtime quality of applications, in terms of performance and energy efficiency. These transformations may indirectly affect software security, since they may lead to the introduction of new security issues. In this work, we empirically examine the impact of source code-level energy/performance optimizations on software security and vice versa. The preliminary results of the empirical study suggest that the energy-related transformations may indirectly affect software security, whereas the incremental addition of security mechanisms may lead to an important increase in the energy consumption of software applications.&lt;/p&gt;</subfield>
  </datafield>
  <datafield tag="773" ind1=" " ind2=" ">
    <subfield code="n">doi</subfield>
    <subfield code="i">isVersionOf</subfield>
    <subfield code="a">10.5281/zenodo.3379866</subfield>
  </datafield>
  <datafield tag="024" ind1=" " ind2=" ">
    <subfield code="a">10.5281/zenodo.3379867</subfield>
    <subfield code="2">doi</subfield>
  </datafield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="a">publication</subfield>
    <subfield code="b">conferencepaper</subfield>
  </datafield>
</record>
93
72
views
downloads
All versions This version
Views 9393
Downloads 7272
Data volume 43.7 MB43.7 MB
Unique views 8484
Unique downloads 6262

Share

Cite as