Essays about: "TEE"
Showing result 1 - 5 of 19 essays containing the word TEE.
-
1. Enhancing Privacy in Cookieless Web Advertising : A Comparative Study of Multi-Party Computation and Trusted Execution Environment Solutions for Private Attribution Reporting
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The end of third-party cookies has driven the advertising market to seek new solutions. Third-party cookies were widely used to track users’ online activities across websites. However, the growing concern for privacy has led web browsers to put an end to this practice. READ MORE
-
2. Automating Deployments of Trusted Execution Environments
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Hardware-based TEEs (Trusted Execution Environments) are gaining adoption and becoming more prevalent in today’s computing landscape. In a cloud-native world, where everything runs on ephemeral compute, having the luxury of experts setting up computation environments before running a workload is no longer a possibility. READ MORE
-
3. Using ARM TrustZone for Secure Resource Monitoring of IoT Devices Running Contiki-NG
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The rapid development of Internet of Things (IoT) devices has brought unparalleled convenience and efficiency to our daily lives. However, with this exponential growth comes the pressing need to address the critical security challenges posed by these interconnected devices. READ MORE
-
4. Modeling Interest Rate Risk in the Banking Book
University essay from KTH/Matematik (Avd.)Abstract : For a long time, being able to model and mitigate financial risk has been a key success factor for institutions. Apart from an internal incentive, legal and regulatory requirements continue to develop which increases the need for extensive internal risk control. READ MORE
-
5. Fuzzing of PKCS#11 Trusted Application
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : The main goal of this thesis is to find an effective way to fuzz trusted applications (TAs) with source code residing in trusted execution environment (TEE). While fuzzing TAs has been previously done, no work has been found to utilize the source code of TAs to improve the fuzzing. READ MORE