Essays about: "säkerhetskritisk"

Showing result 6 - 10 of 15 essays containing the word säkerhetskritisk.

  1. 6. Towards attack-tolerant trusted execution environments : Secure remote attestation in the presence of side channels

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Max Crone; [2021]
    Keywords : trusted execution environment; remote attestation; sel4; microkernel; arm trustzone; intel sgx; side-channels; transient execution attacks; trusted execution environment; remote attestation; sel4; microkernel; arm trustzone; intel sgx; side-channels; transient execution attacks;

    Abstract : In recent years, trusted execution environments (TEEs) have seen increasing deployment in computing devices to protect security-critical software from run-time attacks and provide isolation from an untrustworthy operating system (OS). A trusted party verifies the software that runs in a TEE using remote attestation procedures. READ MORE

  2. 7. Implementation and evaluation of bounded invariant model checking for a subset of Stateflow

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Gustav Ung; [2021]
    Keywords : Formal methods; Bounded Model Checking; Stateflow; SLDV; Formella metoder; Begränsad modellprovning; Stateflow; SLDV;

    Abstract : Stateflowmodels are used for describing logic and implementing state machines in modern safety-critical software. However, the complete Stateflowmodelling language is hard to formally define, therefore a subset relevant for industrial models has been developed in previous works. READ MORE

  3. 8. Systematically uncovering mutants in testing safety critical software : Using symbolic execution on surviving mutants from mutation testing

    University essay from Linköpings universitet/Programvara och system

    Author : Niklas Pettersson; Nils Petersson; [2019]
    Keywords : Mutation Testing; Symbolic Execution; Dextool;

    Abstract : This thesis investigates how symbolic execution and constraint solving can be used for detecting equivalent and non-equivalent mutants in mutation testing. The presented method proposes a driver implementation, realized as a plugin for Dextool, to differentiate original and mutated code from each other by executing both versions symbolically using KLEE. READ MORE

  4. 9. TLS Library for Isolated Enclaves : Optimizing the performance of TLS libraries for SGX

    University essay from KTH/Kommunikationssystem, CoS

    Author : Jiatong Li; [2019]
    Keywords : Intel SGX; Trusted Execution Environment; TLS libraries; Intel SGX; Trusted Execution Environment; TLS-bibliotek;

    Abstract : Nowadays cloud computing systems handle large amounts of data and process this data across different systems. It is essential to considering data security vulnerabilities and data protection. READ MORE

  5. 10. The Agile method Scrum in development of safety critical applications : A case study about challenges and opportunities for developers and verifiers

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Kim Hiltunen; [2018]
    Keywords : Agile methods; Scrum; Safety critical application development; Agila metoder; Scrum; Säkerhetskritisk applikationsutveckling;

    Abstract : When it comes to using agile methods in safety critical application development, there is a limited amount of empirical findings. To learn more about how people in this field perceives the use of working with these methods, it is of interest to take part of their experiences and opinions. READ MORE