Essays about: "Trusted Execution Environment"

Showing result 6 - 10 of 18 essays containing the words Trusted Execution Environment.

  1. 6. Enclave Host Interface for Security

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Anmol Sinha; [2022]
    Keywords : Trusted Execution Environment; Enclave; Trusted Applications; SDK; Visual Studio Code; Trusted Execution Environment; Enclave; Trusted Applications; SDK; Visual Studio Code;

    Abstract : Secure enclave technology has during the last decade emerged as an important hardware security primitive in server computer cores, and increasingly also in chips intended for consumer devices like mobile phones and PCs. The Linux Confidential Compute Consortium has taken a leading role in defining the host APIs for enclave access (e.g. READ MORE

  2. 7. Securing cloud-hosted IoT Workflows with Intel SGX

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Adnan Jamil Ahsan; [2022]
    Keywords : IoT; Node-RED; Azure; SGX; Gramine; Trusted Execution Environment; Security; STRIDE;

    Abstract : The rapid increase in the number of IoT devices and their widespread applications demands secure and scalable solutions for managing and executing IoT workflows. This thesis investigates the security of IoT workflows created in Node-RED, an open-source visual programming tool, and deployed on untrusted hosts managed by a major cloud service provider, Azure. READ MORE

  3. 8. Evaluating Privacy Technologies in Blockchains for Financial Systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Spoorthi Satheesha; [2021]
    Keywords : Blockchain; Encryption; Privacy; Trusted Execution Environment; Zero- Knowledge Proof; Blockkedja; Kryptering; Sekretess; Tillförlitlig Exekveringsmiljö; Bevis För Nollkunskap;

    Abstract : The requirements of privacy have become a necessity in modern-day internet-based applications. This applies from traditional client-server applications to blockchain-based applications. Blockchains being a new domain for application development, the priority towards privacy beyond pseudo anonymity has been lacking. READ MORE

  4. 9. Detection of side-channel attacks targeting Intel SGX

    University essay from Linköpings universitet/Programvara och system

    Author : David Lantz; [2021]
    Keywords : Security; Trusted execution environment; Intel SGX; side channel attacks; Load value injection; detection; performance counters;

    Abstract : In recent years, trusted execution environments like Intel SGX have allowed developers to protect sensitive code inside so called enclaves. These enclaves protect its code and data even in the cases of a compromised OS. However, SGX enclaves have been shown to be vulnerable to numerous side-channel attacks. READ MORE

  5. 10. Towards attack-tolerant trusted execution environments : Secure remote attestation in the presence of side channels

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Max Crone; [2021]
    Keywords : trusted execution environment; remote attestation; sel4; microkernel; arm trustzone; intel sgx; side-channels; transient execution attacks; trusted execution environment; remote attestation; sel4; microkernel; arm trustzone; intel sgx; side-channels; transient execution attacks;

    Abstract : In recent years, trusted execution environments (TEEs) have seen increasing deployment in computing devices to protect security-critical software from run-time attacks and provide isolation from an untrustworthy operating system (OS). A trusted party verifies the software that runs in a TEE using remote attestation procedures. READ MORE