Search for dissertations about: "untrusted software"

Showing result 1 - 5 of 8 swedish dissertations containing the words untrusted software.

  1. 1. Lightweight Enforcement of Fine-Grained Security Policies for Untrusted Software

    Author : Phu Phung; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; security policy enforcement; JavaScript security; web-application security; vehicle software security; untrusted software;

    Abstract : This thesis presents an innovative approach to implementing a security enforcement mechanism in the contexts of untrusted software systems, where a piece of code in a base system may come from an untrusted third party. The key point of the approach is that it is lightweight in the sense that it does not need an additional policy language or extra tool. READ MORE

  2. 2. Lightweight Inlined Reference Monitors for Securing Extensible and Open Systems

    Author : Phu Phung; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; Security; Inlined Reference Monitors; JavaScript; Vehicle Software Security;

    Abstract : This thesis studies an alternative implementation of asecurity reference monitor in the contexts of extensible and opensystems. A security reference monitor is a classic approach to imposing asecurity policy on an otherwise untrusted system by using a trusted componentwhich intercepts security-relevant resource requests and applies a securitypolicy to decide whether to grant such requests. READ MORE

  3. 3. Towards Trustworthy and Secure Internet of Things Devices : Using hardware-assisted Trusted Execution and Automated Certification

    Author : Anum Khurshid; Shahid Raza; Thiemo Voigt; Christian Gehrmann; Uppsala universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Internet of Things; IoT device security; Trusted Execution Environments; Trusted Platform Module; TPM 2.0; IoT Certification; Assurance; TrustZone-M; TEE; Secure software updates; X.509;

    Abstract : The advent of Trusted Execution Environments (TEEs) for IoT aligns with the reinforcement of IoT security through recent laws and regulations. A major part of IoT systems comprises of resource-constrained devices, with less margin in memory and computation capabilities to embed sophisticated security solutions. READ MORE

  4. 4. No Hypervisor Is an Island : System-wide Isolation Guarantees for Low Level Code

    Author : Oliver Schwarz; Mads Dam; Christian Gehrmann; Gerwin Klein; KTH; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Platform Security; Hypervisor; Formal Verification; Theorem Proving; HOL4; DMA; Peripheral Devices; Instruction Set Architectures; ISA; Information Flow; Boot; Computer Science; Datalogi;

    Abstract : The times when malware was mostly written by curious teenagers are long gone. Nowadays, threats come from criminals, competitors, and government agencies. Some of them are very skilled and very targeted in their attacks. READ MORE

  5. 5. Formal Verification of Peripheral Memory Isolation

    Author : Jonas Haglund; Roberto Guanciale; Mads Dam; Gligor Virgil; KTH; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; formal verification; interactive theorem proving; direct memory access; memory isolation; input output; formell verifiering; interaktiv datorassisterad beviskonstruktion; direkt minnesåtkomst; minnesisolering; indata utdata; Datalogi; Computer Science;

    Abstract : In many contexts, computers run both critical and untrusted software,necessitating the need for isolating critical software from untrusted software.These computers contain CPUs, memory and peripherals. READ MORE