Sökning: "Trusted execution environments"
Visar resultat 1 - 5 av 16 uppsatser innehållade orden Trusted execution environments.
1. Formally Verified Remote Attestation Protocols with Strong Authentication
Master-uppsats, Linköpings universitet/Programvara och system; Linköpings universitet/Tekniska fakultetenSammanfattning : Most commodity processors available today provide hardware-supported security extensions. Remote attestation has been declared an important step towards providing security to users through such solutions, yet remote attestation has seen limited deployment in practice. LÄS MER
2. Automating Deployments of Trusted Execution Environments
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Hardware-based TEEs (Trusted Execution Environments) are gaining adoption and becoming more prevalent in today’s computing landscape. In a cloud-native world, where everything runs on ephemeral compute, having the luxury of experts setting up computation environments before running a workload is no longer a possibility. LÄS MER
3. Fuzzing of PKCS#11 Trusted Application
Master-uppsats, Lunds universitet/Institutionen för elektro- och informationsteknikSammanfattning : The main goal of this thesis is to find an effective way to fuzz trusted applications (TAs) with source code residing in trusted execution environment (TEE). While fuzzing TAs has been previously done, no work has been found to utilize the source code of TAs to improve the fuzzing. LÄS MER
4. Trusted Execution Environment deployment through cloud Virtualization : Aproject on scalable deployment of virtual machines
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : In the context of cloud computing, Trusted Execution Environments (TEE) are isolated areas of application software that can be executed with better security, building a trusted and secure environment that is detached from the rest of the memory. Trusted Execution Environment is a technology that become available only in the last few years, and it is not widespread yet. LÄS MER
5. Enclave Host Interface for Security
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Secure enclave technology has during the last decade emerged as an important hardware security primitive in server computer cores, and increasingly also in chips intended for consumer devices like mobile phones and PCs. The Linux Confidential Compute Consortium has taken a leading role in defining the host APIs for enclave access (e.g. LÄS MER