Sökning: "untrusted software"

Visar resultat 6 - 8 av 8 avhandlingar innehållade orden untrusted software.

  1. 6. Functional Programming for Securing Cloud and Embedded Environments

    Författare :Abhiroop Sarkar; Chalmers tekniska högskola; []
    Nyckelord :NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; trusted execution environment; real time; functional programming; runtime; information flow control; microcontrollers; functional reactive programming;

    Sammanfattning : The ubiquity of digital systems across all aspects of modern society, while beneficial, has simultaneously exposed a lucrative attack surface for potential adversaries and attackers. Consequently, securing digital systems becomes of critical importance. LÄS MER

  2. 7. Architecture for programmable network infrastructure

    Författare :Tom Barbette; Laurent Matht; University of Liege; []
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; networking; high-speed; dpdk; netmap; click; fastclick; middleclick; nfv; sdn; dataplane; parallelism; Computer Science; Datalogi;

    Sammanfattning : Software networking promises a more flexible network infrastructure, poised to leverage the computational power available in datacenters. Virtual Net- work Functions (VNF) can now run on commodity hardware in datacenters instead of using specialized equipment disposed along the network path. LÄS MER

  3. 8. Inlined Reference Monitors : Certification,Concurrency and Tree Based Monitoring

    Författare :Andreas Lundblad; Mads Dam; Gul Agha; KTH; []
    Nyckelord :NATURVETENSKAP; NATURAL SCIENCES; Runtime monitoring; policy enforcement; tree automata; monitor inlining; certification; concurrency;

    Sammanfattning : Reference monitor inlining is a technique for enforcing security policies by injecting security checks into the untrusted software in a style similar to aspect-oriented programming. The intention is that the injected code enforces compliance with the policy (security), without adding behavior (conservativity) or affecting existing policy compliant behavior (transparency). LÄS MER