Search for dissertations about: "untrusted software"
Showing result 1 - 5 of 8 swedish dissertations containing the words untrusted software.
-
1. Lightweight Enforcement of Fine-Grained Security Policies for Untrusted Software
Abstract : This thesis presents an innovative approach to implementing a security enforcement mechanism in the contexts of untrusted software systems, where a piece of code in a base system may come from an untrusted third party. The key point of the approach is that it is lightweight in the sense that it does not need an additional policy language or extra tool. READ MORE
-
2. Lightweight Inlined Reference Monitors for Securing Extensible and Open Systems
Abstract : This thesis studies an alternative implementation of asecurity reference monitor in the contexts of extensible and opensystems. A security reference monitor is a classic approach to imposing asecurity policy on an otherwise untrusted system by using a trusted componentwhich intercepts security-relevant resource requests and applies a securitypolicy to decide whether to grant such requests. READ MORE
-
3. Towards Trustworthy and Secure Internet of Things Devices : Using hardware-assisted Trusted Execution and Automated Certification
Abstract : The advent of Trusted Execution Environments (TEEs) for IoT aligns with the reinforcement of IoT security through recent laws and regulations. A major part of IoT systems comprises of resource-constrained devices, with less margin in memory and computation capabilities to embed sophisticated security solutions. READ MORE
-
4. No Hypervisor Is an Island : System-wide Isolation Guarantees for Low Level Code
Abstract : The times when malware was mostly written by curious teenagers are long gone. Nowadays, threats come from criminals, competitors, and government agencies. Some of them are very skilled and very targeted in their attacks. READ MORE
-
5. Formal Verification of Peripheral Memory Isolation
Abstract : In many contexts, computers run both critical and untrusted software,necessitating the need for isolating critical software from untrusted software.These computers contain CPUs, memory and peripherals. READ MORE