• Login
    Mostra Item 
    •   Unical - archivio istituzionale delle tesi di dottorato
    • Tesi di Dottorato
    • Dipartimento di Ingegneria Informatica, Modellistica, Elettronica e Sistemistica - Tesi di Dottorato
    • Mostra Item
    •   Unical - archivio istituzionale delle tesi di dottorato
    • Tesi di Dottorato
    • Dipartimento di Ingegneria Informatica, Modellistica, Elettronica e Sistemistica - Tesi di Dottorato
    • Mostra Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Theoretical and Practical Aspects of Trusted Execution Environments in Information Security and Volunteer Computing

    Creato da
    Ianni, Michele
    Pugliese, Andrea
    Masciari, Elio
    Metadata
    Mostra tutti i dati dell'item
    URI
    http://hdl.handle.net/10955/1807
    https://doi.org/10.13126/unical.it/dottorati/1807
    Descrizione

    Formato

    /
    Dottorato di Ricerca in Information and Computation Technologies, Ciclo XXX; Commodity operating systems, both on desktop and mobile devices, offer rich functionality and consequently a significant attack surface. A compromise of the operating system, however, means that an attacker also has access to any critical assets of the user’s applications. These critical assets include code, which either is part of security-critical functionality, or of commercial value and other sensitive information whose disclosure, even in a minimal part, must be avoided. While many platforms offer support for Trusted Execution Environments (TEEs), these are currently restricted for the use of secure services provided by the operating system or the vendor. Developers have to rely on obfuscation to protect their own code from unauthorized tampering or copying, which only provides an obstacle for an attacker but does not prevent compromise. In collaborative networks, moreover, many problems are usually not handled at all, since it is not possible, in many cases, to hide confidential data from inputs of the subtasks solved by the computers of the network. This thesis proposes to take advantage and extend these TEEs to also offer code protection for arbitrary application and secure data in volunteer computing networks; Università della Calabria
    Soggetto
    Computer security
    Relazione
    ING-INF/05;

    Policy e regolamenti
    Copyright © Università della Calabria - Sistema Bibliotecario di Ateneo - Servizio Automazione Biblioteche | DSpace 6.3
    Contattaci
    Theme by 
    @mire NV
     

     

    Ricerca

    Esplora perArchivi & CollezioniData di pubblicazioneAutoriTitoliSoggettiQuesta CollezioneData di pubblicazioneAutoriTitoliSoggetti

    My Account

    LoginRegistrazione

    Policy e regolamenti
    Copyright © Università della Calabria - Sistema Bibliotecario di Ateneo - Servizio Automazione Biblioteche | DSpace 6.3
    Contattaci
    Theme by 
    @mire NV