Sökning: "Trusted Hardware"

Visar resultat 1 - 5 av 27 uppsatser innehållade orden Trusted Hardware.

  1. 1. Formally Verified Remote Attestation Protocols with Strong Authentication

    Master-uppsats, Linköpings universitet/Programvara och system; Linköpings universitet/Tekniska fakulteten

    Författare :Johannes Wilson; [2023]
    Nyckelord :;

    Sammanfattning : Most commodity processors available today provide hardware-supported security extensions. Remote attestation has been declared an important step towards providing security to users through such solutions, yet remote attestation has seen limited deployment in practice. LÄS MER

  2. 2. Automating Deployments of Trusted Execution Environments

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Gidófalvy Gordon Zsolt; [2023]
    Nyckelord :hardware TEE; Intel SGX; AMD SEV; SEV-SNP; automation; configuration management; Ansible; scripting; OS dependency management; automation tooling; system tooling; system administration; hardware TEE; Intel SGX; AMD SEV; SEV-SNP; automatisering; konfigurationshantering; Ansible; skript; hantering av OS-beroenden; verktyg för automatisering; systemverktyg; systemverktyg; systemadministration; hardware TEE; Intel SGX; AMD SEV; SEV-SNP; automatisering; konfigurationshantering; Ansible; skript; hantering av OS-beroenden; verktyg för automatisering; systemverktyg; systemverktyg; systemadministration;

    Sammanfattning : Hardware-based TEEs (Trusted Execution Environments) are gaining adoption and becoming more prevalent in today’s computing landscape. In a cloud-native world, where everything runs on ephemeral compute, having the luxury of experts setting up computation environments before running a workload is no longer a possibility. LÄS MER

  3. 3. Using ARM TrustZone for Secure Resource Monitoring of IoT Devices Running Contiki-NG

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Nikolaos Georgiou; [2023]
    Nyckelord :ARM TrustZone; Internet Of Things; Trusted Execution Environment; Secure monitoring; Contiki-NG; ARM TrustZone; Internet Of Things; Trusted Execution Environment; Säker övervakning; Contiki-NG;

    Sammanfattning : The rapid development of Internet of Things (IoT) devices has brought unparalleled convenience and efficiency to our daily lives. However, with this exponential growth comes the pressing need to address the critical security challenges posed by these interconnected devices. LÄS MER

  4. 4. Enclave Host Interface for Security

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Anmol Sinha; [2022]
    Nyckelord :Trusted Execution Environment; Enclave; Trusted Applications; SDK; Visual Studio Code; Trusted Execution Environment; Enclave; Trusted Applications; SDK; Visual Studio Code;

    Sammanfattning : Secure enclave technology has during the last decade emerged as an important hardware security primitive in server computer cores, and increasingly also in chips intended for consumer devices like mobile phones and PCs. The Linux Confidential Compute Consortium has taken a leading role in defining the host APIs for enclave access (e.g. LÄS MER

  5. 5. Digital twin of a safe system

    Uppsats för yrkesexamina på avancerad nivå, Luleå tekniska universitet/Institutionen för teknikvetenskap och matematik

    Författare :Johan Edenhamn; [2022]
    Nyckelord :digital twin; safe system; hardware-in-the-loop HIL ; hydraulic model;

    Sammanfattning : At Epiroc’s drill rigs a safe system is installed to make sure the vehicle is driven in a safe manner. In the development both machine tests and hardware-in-the-loop (HIL) tests have been performed but when changes are made the firmware in the safe modules has to be updated. To speed up the process a digital twin would be beneficial. LÄS MER