Enrico Bravi
Use of trusted computing techniques to counteract cybersecurity attacks in critical infrastructures.
Rel. Antonio Lioy, Diana Gratiela Berbecaru, Ignazio Pedone. Politecnico di Torino, Master of science program in Computer Engineering, 2022
|
Preview |
PDF (Tesi_di_laurea)
- Thesis
Licence: Creative Commons Attribution Non-commercial No Derivatives. Download (2MB) | Preview |
Abstract
Nowadays to manage critical infrastructures there are largely adopted paradigms such as Cloud Computing, Fog Computing, and Edge Computing. They introduce several advantages, like ensuring great flexibility, availability and reducing management costs. These goals are mostly achieved thanks to the advantages of virtualization technologies. Despite these techniques introduce several advantages in terms of performance, they introduce also several security threats like attacks against software integrity. To mitigate these kinds of threats can be used Trusted Computing techniques like Remote Attestation (RA) which permits a third party (Verifier) to verify the software and configurations' integrity of a platform (Attester) to determine its trustworthiness. To perform RA there are several techniques that can be based on some secure hardware (e.g.
TPM and TEE based) or based only on software solutions (e.g
Publication type
URI
![]() |
Modify record (reserved for operators) |
