Essays about: "Linux security"

Showing result 11 - 15 of 62 essays containing the words Linux security.

  1. 11. Formal verification of device driver monitors in HOL 4

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Tomas Möre; [2021]
    Keywords : ;

    Abstract : As computer systems become more ubiquitous in society the negative consequences of security holes and bugs in software and hardware grow larger. In theory, the optimal way to ensure that no such possibilites exists is to conduct formal proofs that the system behaves as it should and that it is incapable of performing unintended side-effects. READ MORE

  2. 12. Building and Evaluating a Full Disk Encrypted Secure Multi-user Operating Platform in Linux

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Peter Boström; [2021]
    Keywords : ;

    Abstract : Security is more important than ever, and since we are storing much of our sensitive data on hard drives, the demand for security systems is high. Full disk encrypted systems where multiple users can decrypt the same hard drive using the same secret but with different credentials are not common and is something that the military and various companies demand. READ MORE

  3. 13. Confidential Computing in Public Clouds : Confidential Data Translations in hardware-based TEEs: Intel SGX with Occlum support

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sri Yulianti; [2021]
    Keywords : TEEs; Intel SGX; Library OS; Occlum; Confidential Computing; Confidential Machine Learning; TEEs; Intel SGX; Library OS; Occlum; Konfidentiell databehandling; konfidentiellt maskininlärning;

    Abstract : As enterprises migrate their data to cloud infrastructure, they increasingly need a flexible, scalable, and secure marketplace for collaborative data creation, analysis, and exchange among enterprises. Security is a prominent research challenge in this context, with a specific question on how two mutually distrusting data owners can share their data. READ MORE

  4. 14. Implementation of a Deep Learning Inference Accelerator on the FPGA.

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Shenbagaraman Ramakrishnan; [2020]
    Keywords : Artificial Intelligence; Machine Learning; Deep Learning; Neural Networks; Deep Learning Accelerators; NVDLA; FPGA; Technology and Engineering;

    Abstract : Today, Artificial Intelligence is one of the most important technologies, ubiquitous in our daily lives. Deep Neural Networks (DNN's) have come up as state of art for various machine intelligence applications such as object detection, image classification, face recognition and performs myriad of activities with exceptional prediction accuracy. READ MORE

  5. 15. Models for Risk assessment of Mobile applications

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Chigozie Charles Ikwuegbu; [2020]
    Keywords : Risk Assessment; Security and Privacy; Machine Learning; Mobile application security; Mo-bile application metadata;

    Abstract : Mobile applications are software that extend the functionality of our smartphones by connecting us with friends and a wide range of other services. Android, which is an operating system based on the Linux kernel, leads the market with over 2.6 million applications recorded on their official store. READ MORE