Providing security on demand using invasive computing

Gabor Drescher 1 , Christoph Erhardt 1 , Felix Freiling 2 , Johannes Götzfried 2 , Daniel Lohmann 1 , Pieter Maene 3 , Tilo Müller 2 , Ingrid Verbauwhede 3 , Andreas Weichslgartner 4 ,  and Stefan Wildermann 4
  • 1 Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU), Lehrstuhl für Informatik 4, Martensstr. 1, D-91058 Erlangen, Germany, Germany
  • 2 Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU), Lehrstuhl für Informatik 1, Martensstr. 3, D-91058 Erlangen, Germany, Germany
  • 3 KU Leuven, Department of Electrical Engineering (ESAT), COSIC, Kasteelpark Arenberg 10, B-3001 Heverlee, Belgium, Belgium
  • 4 Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU), Lehrstuhl für Informatik 12, Cauerstr. 11, D-91058 Erlangen, Germany, Germany


The invasive computing paradigm offers applications the possibility to dynamically spread their computation in a multicore/multiprocessor system in a resource-aware way. If applications are assumed to act maliciously, many security problems arise. In this acticle, we discuss different ways to deal with security problems in a resource-aware way. We first formalize the attacker model and the different security requirements that applications may have in multi-core systems. We then survey different hardware and software security mechanisms that can be dynamically configured to guarantee security on demand for invasive applications.

Purchase article
Get instant unlimited access to the article.
Log in
Already have access? Please log in.

Log in with your institution

Journal + Issues

it - Information Technology is a strictly peer-reviewed scientific journal. It is the oldest German journal in the field of information technology. Today, the major aim of it - Information Technology is highlighting issues on ongoing newsworthy areas in information technology and informatics and their application. It aims at presenting the topics with a holistic view.