Essays about: "Trusted Execution Environment"

Showing result 11 - 15 of 18 essays containing the words Trusted Execution Environment.

  1. 11. Arguing Assurance in Trusted Execution Environments using Goal Structuring Notation

    University essay from Linköpings universitet/Programvara och system

    Author : Nigel Cole; [2021]
    Keywords : Assurance; Trusted Execution Environment; TEE; Goal Structuring Notation; GSN; Keystone;

    Abstract : A trusted execution environment (TEE) is an isolated environment used for trusted execution. TEE solutions are usually proprietary and specific for a certain hardware specification, thereby limiting developers that use those TEEs. READ MORE

  2. 12. TLS Library for Isolated Enclaves : Optimizing the performance of TLS libraries for SGX

    University essay from KTH/Kommunikationssystem, CoS

    Author : Jiatong Li; [2019]
    Keywords : Intel SGX; Trusted Execution Environment; TLS libraries; Intel SGX; Trusted Execution Environment; TLS-bibliotek;

    Abstract : Nowadays cloud computing systems handle large amounts of data and process this data across different systems. It is essential to considering data security vulnerabilities and data protection. READ MORE

  3. 13. Hardware Root of Trust on IoT Gateway

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Maharsh Raval; Rajkiran Sunkireddy; [2019]
    Keywords : ;

    Abstract : Gateways play a vital role in the Internet of Things (IoT) infrastructure. Gateways are widely used and their usage range from industries to smart homes. As they have expanded nowadays to have internet connectivity which raises certain security issues like being exposed to various threats and cyber-attacks such as rootkits, bootkits. READ MORE

  4. 14. Hardware Root of Trust for Linux Based Edge Gateway

    University essay from Högskolan Kristianstad/Fakulteten för naturvetenskap

    Author : Mohamed Al-Galby; Madani Arezou; [2018]
    Keywords : HRoT; TPM 2.0; Zynq; TSS; RSA; Secure Boot; TPM Simulator;

    Abstract : Linux-based Edge Gateways that connects hundreds or maybe thousands of IoT devices, are exposed to various threats and cyber-attacks from the internet. These attacks form a considerable risk targeting the privacy and confidentiality of IoT devices throughout their gateways. READ MORE

  5. 15. Engineering Content-Centric Future Internet Applications

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Alain Perkaz; [2018]
    Keywords : Future Internet; content-centric applications; semantic annotations; interest-defined communities; PRIME middleware;

    Abstract : The Internet as we know it today has sustained continuous evolution since its creation, radically changing means of communication and ways in which commerce is globally operated. From the World Wide Web to the two-way video calls, it has shifted the ways people communicate and societies function. READ MORE