Enrico Bravi
Use of trusted computing techniques to counteract cybersecurity attacks in critical infrastructures.
Rel. Antonio Lioy, Diana Gratiela Berbecaru, Ignazio Pedone. Politecnico di Torino, Corso di laurea magistrale in Ingegneria Informatica (Computer Engineering), 2022
|
Preview |
PDF (Tesi_di_laurea)
- Tesi
Licenza: Creative Commons Attribution Non-commercial No Derivatives. Download (2MB) | Preview |
Abstract
Nowadays to manage critical infrastructures there are largely adopted paradigms such as Cloud Computing, Fog Computing, and Edge Computing. They introduce several advantages, like ensuring great flexibility, availability and reducing management costs. These goals are mostly achieved thanks to the advantages of virtualization technologies. Despite these techniques introduce several advantages in terms of performance, they introduce also several security threats like attacks against software integrity. To mitigate these kinds of threats can be used Trusted Computing techniques like Remote Attestation (RA) which permits a third party (Verifier) to verify the software and configurations' integrity of a platform (Attester) to determine its trustworthiness. To perform RA there are several techniques that can be based on some secure hardware (e.g.
TPM and TEE based) or based only on software solutions (e.g
Relatori
Anno Accademico
Tipo di pubblicazione
Numero di pagine
Corso di laurea
Classe di laurea
Aziende collaboratrici
URI
![]() |
Modifica (riservato agli operatori) |
