Mostra i principali dati dell'item
Theoretical and Practical Aspects of Trusted Execution Environments in Information Security and Volunteer Computing
dc.contributor.author | Ianni, Michele | |
dc.contributor.author | Pugliese, Andrea | |
dc.contributor.author | Masciari, Elio | |
dc.date.accessioned | 2019-11-29T09:24:16Z | |
dc.date.available | 2019-11-29T09:24:16Z | |
dc.date.issued | 2018-08-06 | |
dc.identifier.uri | http://hdl.handle.net/10955/1807 | |
dc.description | Dottorato di Ricerca in Information and Computation Technologies, Ciclo XXX | en_US |
dc.description.abstract | Commodity operating systems, both on desktop and mobile devices, offer rich functionality and consequently a significant attack surface. A compromise of the operating system, however, means that an attacker also has access to any critical assets of the user’s applications. These critical assets include code, which either is part of security-critical functionality, or of commercial value and other sensitive information whose disclosure, even in a minimal part, must be avoided. While many platforms offer support for Trusted Execution Environments (TEEs), these are currently restricted for the use of secure services provided by the operating system or the vendor. Developers have to rely on obfuscation to protect their own code from unauthorized tampering or copying, which only provides an obstacle for an attacker but does not prevent compromise. In collaborative networks, moreover, many problems are usually not handled at all, since it is not possible, in many cases, to hide confidential data from inputs of the subtasks solved by the computers of the network. This thesis proposes to take advantage and extend these TEEs to also offer code protection for arbitrary application and secure data in volunteer computing networks | en_US |
dc.description.sponsorship | Università della Calabria | en_US |
dc.language.iso | en | en_US |
dc.relation.ispartofseries | ING-INF/05; | |
dc.subject | Computer security | en_US |
dc.title | Theoretical and Practical Aspects of Trusted Execution Environments in Information Security and Volunteer Computing | en_US |
dc.type | Thesis | en_US |
Files in questo item
Files | Dimensione | Formato | Mostra |
---|---|---|---|
Nessun files in questo item. |