Essays about: "Hårdvaruisolering"

Found 3 essays containing the word Hårdvaruisolering.

  1. 1. Evaluating hardware isolation for secure software development in Highly Regulated Environments

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Andre Brogärd; [2023]
    Keywords : Hardware Isolation; Supply chain attacks; HRE; Intel SGX; CI; Hårdvaruisolering; Distributionskedjeattacker; HRE; Intel SGX; CI;

    Abstract : Organizations in highly regulated industries have an increasing need to protect their intellectual assets, because Advanced Persistent Threat (APT) entities are capable of using supply chain attacks to bypass traditional defenses. This work investigates the feasibility of preventing supply chain attacks by isolating the build environment of the software using hardware isolation. READ MORE

  2. 2. Using ARM TrustZone for Secure Resource Monitoring of IoT Devices Running Contiki-NG

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Nikolaos Georgiou; [2023]
    Keywords : ARM TrustZone; Internet Of Things; Trusted Execution Environment; Secure monitoring; Contiki-NG; ARM TrustZone; Internet Of Things; Trusted Execution Environment; Säker övervakning; Contiki-NG;

    Abstract : The rapid development of Internet of Things (IoT) devices has brought unparalleled convenience and efficiency to our daily lives. However, with this exponential growth comes the pressing need to address the critical security challenges posed by these interconnected devices. READ MORE

  3. 3. Enclave Host Interface for Security

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Anmol Sinha; [2022]
    Keywords : Trusted Execution Environment; Enclave; Trusted Applications; SDK; Visual Studio Code; Trusted Execution Environment; Enclave; Trusted Applications; SDK; Visual Studio Code;

    Abstract : Secure enclave technology has during the last decade emerged as an important hardware security primitive in server computer cores, and increasingly also in chips intended for consumer devices like mobile phones and PCs. The Linux Confidential Compute Consortium has taken a leading role in defining the host APIs for enclave access (e.g. READ MORE