Avancerad sökning
Visar resultat 1 - 5 av 8 avhandlingar som matchar ovanstående sökkriterier.
1. Lightweight Enforcement of Fine-Grained Security Policies for Untrusted Software
Sammanfattning : This thesis presents an innovative approach to implementing a security enforcement mechanism in the contexts of untrusted software systems, where a piece of code in a base system may come from an untrusted third party. The key point of the approach is that it is lightweight in the sense that it does not need an additional policy language or extra tool. LÄS MER
2. Lightweight Inlined Reference Monitors for Securing Extensible and Open Systems
Sammanfattning : This thesis studies an alternative implementation of asecurity reference monitor in the contexts of extensible and opensystems. A security reference monitor is a classic approach to imposing asecurity policy on an otherwise untrusted system by using a trusted componentwhich intercepts security-relevant resource requests and applies a securitypolicy to decide whether to grant such requests. LÄS MER
3. Towards Trustworthy and Secure Internet of Things Devices : Using hardware-assisted Trusted Execution and Automated Certification
Sammanfattning : The advent of Trusted Execution Environments (TEEs) for IoT aligns with the reinforcement of IoT security through recent laws and regulations. A major part of IoT systems comprises of resource-constrained devices, with less margin in memory and computation capabilities to embed sophisticated security solutions. LÄS MER
4. No Hypervisor Is an Island : System-wide Isolation Guarantees for Low Level Code
Sammanfattning : The times when malware was mostly written by curious teenagers are long gone. Nowadays, threats come from criminals, competitors, and government agencies. Some of them are very skilled and very targeted in their attacks. LÄS MER
5. Formal Verification of Peripheral Memory Isolation
Sammanfattning : In many contexts, computers run both critical and untrusted software,necessitating the need for isolating critical software from untrusted software.These computers contain CPUs, memory and peripherals. LÄS MER