Processor hardware support for security dates back to the 1970s, and such features were then primarily used for hardening operating systems. This idea has re-emerged as hardware security features in contemporary cost-efficient mobile processors. These support specific operating-system functionality such as communication stack isolation and identity binding, which are needed on mobile devices to satisfy regulatory requirements for e.g. cellular phones. This thesis builds on these hardware security features to implement a generic trusted execution environment (TEE) that can be used for a larger variety of applications. We present software building blocks and infrastructure for isolated trustworthy execution on these hardware environments. Th...
Securely storing and using credentials is critical for ensuring the security of many modern distribu...
Security and reliability in processor based systems are concerns requiring adroit solutions. Securit...
The need to increase the hostile attack resilience of distributed and internet-worked computer syste...
Processor hardware support for security dates back to the 1970s, and such features were then primari...
The times when malware was mostly written by curious teenagers are long gone. Nowadays, threats come...
In recent years, trusted execution environments (TEEs) have seen increasing deployment in computing ...
This thesis deals with the analysis and design of trusted computing platforms. Trusted computing tec...
This is a master’s thesis project entitled “Secure reprogramming of network connected devices”. The ...
One problem with computers is that the operating system automatically trusts any externallyconnected...
Hardware-assisted security solutions, and the isolation guarantees they provide, constitute the basi...
Useful security properties arise from sealing data to specific units of code. Modern processors feat...
This thesis explores how hardware security technologies can be applied to satisfy the diverse set of...
Abstract—Security issues become more and more important during the development of mobile devices. In...
Many embedded systems have relatively strong security requirements because they handle confidential ...
Trust is vital for arbitrary entities to interact and cooperate. These entities may have different s...
Securely storing and using credentials is critical for ensuring the security of many modern distribu...
Security and reliability in processor based systems are concerns requiring adroit solutions. Securit...
The need to increase the hostile attack resilience of distributed and internet-worked computer syste...
Processor hardware support for security dates back to the 1970s, and such features were then primari...
The times when malware was mostly written by curious teenagers are long gone. Nowadays, threats come...
In recent years, trusted execution environments (TEEs) have seen increasing deployment in computing ...
This thesis deals with the analysis and design of trusted computing platforms. Trusted computing tec...
This is a master’s thesis project entitled “Secure reprogramming of network connected devices”. The ...
One problem with computers is that the operating system automatically trusts any externallyconnected...
Hardware-assisted security solutions, and the isolation guarantees they provide, constitute the basi...
Useful security properties arise from sealing data to specific units of code. Modern processors feat...
This thesis explores how hardware security technologies can be applied to satisfy the diverse set of...
Abstract—Security issues become more and more important during the development of mobile devices. In...
Many embedded systems have relatively strong security requirements because they handle confidential ...
Trust is vital for arbitrary entities to interact and cooperate. These entities may have different s...
Securely storing and using credentials is critical for ensuring the security of many modern distribu...
Security and reliability in processor based systems are concerns requiring adroit solutions. Securit...
The need to increase the hostile attack resilience of distributed and internet-worked computer syste...