Providing security on demand using invasive computing

Gabor Drescher 1 , Christoph Erhardt 1 , Felix Freiling 2 , Johannes Götzfried 2 , Daniel Lohmann 1 , Pieter Maene 3 , Tilo Müller 2 , Ingrid Verbauwhede 3 , Andreas Weichslgartner 4 ,  und Stefan Wildermann 4
  • 1 Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU), Lehrstuhl für Informatik 4, Martensstr. 1, D-91058 Erlangen, Germany, Germany
  • 2 Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU), Lehrstuhl für Informatik 1, Martensstr. 3, D-91058 Erlangen, Germany, Germany
  • 3 KU Leuven, Department of Electrical Engineering (ESAT), COSIC, Kasteelpark Arenberg 10, B-3001 Heverlee, Belgium, Belgium
  • 4 Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU), Lehrstuhl für Informatik 12, Cauerstr. 11, D-91058 Erlangen, Germany, Germany


The invasive computing paradigm offers applications the possibility to dynamically spread their computation in a multicore/multiprocessor system in a resource-aware way. If applications are assumed to act maliciously, many security problems arise. In this acticle, we discuss different ways to deal with security problems in a resource-aware way. We first formalize the attacker model and the different security requirements that applications may have in multi-core systems. We then survey different hardware and software security mechanisms that can be dynamically configured to guarantee security on demand for invasive applications.

Artikel kaufen
Erhalten sie sofort unbegrenzten Zugriff auf den Artikel.
Haben Sie den Zugang bereits erworben? Melden Sie sich bitte an.

Zugriff über Ihre Institution

Zeitschrift + Hefte

it - Information Technology is a strictly peer-reviewed scientific journal. It is the oldest German journal in the field of information technology. Today, the major aim of it - Information Technology is highlighting issues on ongoing newsworthy areas in information technology and informatics and their application. It aims at presenting the topics with a holistic view.