Zobrazeno 1 - 3
of 3
pro vyhledávání: '"Küçük, Kubilay Ahmet"'
Besides Intel's SGX technology, there are long-running discussions on how trusted computing technologies can be used to cloak malware. Past research showed example methods of malicious activities utilising Flicker, Trusted Platform Module, and recent
Externí odkaz:
http://arxiv.org/abs/2210.06792
Autor:
Küçük, Kubilay Ahmet, Martin, Andrew
Digital services have been offered through remote systems for decades. The questions of how these systems can be built in a trustworthy manner and how their security properties can be understood are given fresh impetus by recent hardware developments
Externí odkaz:
http://arxiv.org/abs/2104.03868
Publikováno v:
EURASIP Journal on Information Security; 9/5/2019, Vol. 2019 Issue 1, pN.PAG-N.PAG, 1p