Essays about: "Software attestation"
Found 3 essays containing the words Software attestation.
-
1. Towards attack-tolerant trusted execution environments : Secure remote attestation in the presence of side channels
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In recent years, trusted execution environments (TEEs) have seen increasing deployment in computing devices to protect security-critical software from run-time attacks and provide isolation from an untrustworthy operating system (OS). A trusted party verifies the software that runs in a TEE using remote attestation procedures. READ MORE
-
2. Cryptographic Attestation of the Origin of Surveillance Images
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : A method is devised that provides authentication and integrity protection for H.264 encoded surveillance video. A digital signature is created at the H. READ MORE
-
3. Trusted terminal-based systems
University essay from Institutionen för systemteknikAbstract : Trust is a concept of increasing importance in today’s information systems where information storage and generation to a higher extent is distributed among several entities throughout local or global networks. This trend in information science requires new ways to sustain the information security in the systems. READ MORE