Sökning: "Key Tee"
Hittade 5 uppsatser innehållade orden Key Tee.
1. Modeling Interest Rate Risk in the Banking Book
Master-uppsats, KTH/Matematik (Avd.)Sammanfattning : For a long time, being able to model and mitigate financial risk has been a key success factor for institutions. Apart from an internal incentive, legal and regulatory requirements continue to develop which increases the need for extensive internal risk control. LÄS MER
2. Fuzzing of PKCS#11 Trusted Application
Master-uppsats, Lunds universitet/Institutionen för elektro- och informationsteknikSammanfattning : The main goal of this thesis is to find an effective way to fuzz trusted applications (TAs) with source code residing in trusted execution environment (TEE). While fuzzing TAs has been previously done, no work has been found to utilize the source code of TAs to improve the fuzzing. LÄS MER
3. Hardware Root of Trust on IoT Gateway
Magister-uppsats, Högskolan i Halmstad/Akademin för informationsteknologiSammanfattning : Gateways play a vital role in the Internet of Things (IoT) infrastructure. Gateways are widely used and their usage range from industries to smart homes. As they have expanded nowadays to have internet connectivity which raises certain security issues like being exposed to various threats and cyber-attacks such as rootkits, bootkits. LÄS MER
4. Hardware Root of Trust for Linux Based Edge Gateway
Magister-uppsats, Högskolan Kristianstad/Fakulteten för naturvetenskapSammanfattning : Linux-based Edge Gateways that connects hundreds or maybe thousands of IoT devices, are exposed to various threats and cyber-attacks from the internet. These attacks form a considerable risk targeting the privacy and confidentiality of IoT devices throughout their gateways. LÄS MER
5. Secure key management in a trusted domain on mobile devices
Master-uppsats, Linköpings universitet/Databas och informationsteknik; Linköpings universitet/Tekniska fakultetenSammanfattning : As mobile devices manage more and more sensitive information they have become a more targeted platform to exploit. To maintain system integrity while providing a highly responsive product, platform developers have developed hardware as well as software solutions to improve security. LÄS MER