Use of SGX to protect network nodes
Grazia D'Onghia
Use of SGX to protect network nodes.
Rel. Antonio Lioy, Ignazio Pedone, Silvia Sisinni. Politecnico di Torino, Master of science program in Computer Engineering, 2023
|
Preview |
PDF (Tesi_di_laurea)
- Thesis
Licence: Creative Commons Attribution Non-commercial No Derivatives. Download (3MB) | Preview |
Abstract
Nowadays computing technologies are exponentially growing up in terms of complexity. As a consequence, it is necessary to develop in parallel new security strategies, having each one of them a specific target. The era of Big Data requires new technologies for data protection in different stages. Moreover, it is necessary to protect systems at the lowest level possible, because even the privileged software can be manipulated by malicious users, thus compromising the code running on the machine. Therefore, data protection, software integrity and trustworthiness of the hardware must be ensured. Trusted Computing is becoming the new frontier of data protection during In-Use stage, namely inside the CPU or the memory.
This can be achieved with Trusted Execution Environments (TEE) and Remote Attestation
Publication type
URI
![]() |
Modify record (reserved for operators) |
