The invasive computing paradigm offers applications the possibility to dynamically spread their computation in
a multicore/multiprocessor system in a resource-aware way. If applications are assumed to act maliciously, many security
problems arise. In this acticle, we discuss different ways to deal with security problems in a resource-aware way. We
first formalize the attacker model and the different security requirements that applications may have in multi-core
systems. We then survey different hardware and software security mechanisms that can be dynamically configured to
guarantee security on demand for invasive applications.