Essays about: "security-critical systems"

Showing result 1 - 5 of 8 essays containing the words security-critical systems.

  1. 1. Automating Deployments of Trusted Execution Environments

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Gidófalvy Gordon Zsolt; [2023]
    Keywords : hardware TEE; Intel SGX; AMD SEV; SEV-SNP; automation; configuration management; Ansible; scripting; OS dependency management; automation tooling; system tooling; system administration; hardware TEE; Intel SGX; AMD SEV; SEV-SNP; automatisering; konfigurationshantering; Ansible; skript; hantering av OS-beroenden; verktyg för automatisering; systemverktyg; systemverktyg; systemadministration; hardware TEE; Intel SGX; AMD SEV; SEV-SNP; automatisering; konfigurationshantering; Ansible; skript; hantering av OS-beroenden; verktyg för automatisering; systemverktyg; systemverktyg; systemadministration;

    Abstract : Hardware-based TEEs (Trusted Execution Environments) are gaining adoption and becoming more prevalent in today’s computing landscape. In a cloud-native world, where everything runs on ephemeral compute, having the luxury of experts setting up computation environments before running a workload is no longer a possibility. READ MORE

  2. 2. Examining the Impact of Microarchitectural Attacks on Microkernels : a study of Meltdown and Spectre

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Gunnar Grimsdal; Patrik Lundgren; [2019]
    Keywords : Genode; Meltdown; Spectre; Nova; Okl4; microarchitectural attacks; microkernel;

    Abstract : Most of today's widely used operating systems are based on a monolithic design and have a very large code size which complicates verification of security-critical applications. One approach to solving this problem is to use a microkernel, i.e., a small kernel which only implements the bare necessities. READ MORE

  3. 3. TLS Library for Isolated Enclaves : Optimizing the performance of TLS libraries for SGX

    University essay from KTH/Kommunikationssystem, CoS

    Author : Jiatong Li; [2019]
    Keywords : Intel SGX; Trusted Execution Environment; TLS libraries; Intel SGX; Trusted Execution Environment; TLS-bibliotek;

    Abstract : Nowadays cloud computing systems handle large amounts of data and process this data across different systems. It is essential to considering data security vulnerabilities and data protection. READ MORE

  4. 4. Development and Assessment of User Interface for Security-Critical Systems

    University essay from Lunds universitet/Ergonomi och aerosolteknologi

    Author : Truong Hoang Huynh; [2015]
    Keywords : information security; security-critical systems; user interface design; usability; Technology and Engineering;

    Abstract : In this master's thesis a user interface for a security application was investigated. The thesis work was done at a security company in Sweden. The goal was to find current problems with the user interface and to develop a new prototype with improvements. A user-centered design approach was employed to achieve this. READ MORE

  5. 5. Security Services on an Optimized Thin Hypervisor for Embedded Systems

    University essay from RISE./SICS

    Author : Viktor Do; [2011]
    Keywords : ;

    Abstract : Virtualization has been used in computer servers for a long time as a means to improve utilization, isolation and management. In recent years, embedded devices have become more powerful, increasingly connected and able to run applications on open source commodity operating systems. READ MORE