Search results for "execution"
showing 4 items of 74 documents
Remote Attestation of Software and Execution-Environment in Modern Machines
2015
The research on network security concentrates mainly on securing the communication channels between two endpoints, which is insufficient if the authenticity of one of the endpoints cannot be determined with certainty. Previously presented methods that allow one endpoint, the authentication authority, to authenticate another remote machine. These methods are inadequate for modern machines that have multiple processors, introduce virtualization extensions, have a greater variety of side effects, and suffer from nondeterminism. This paper addresses the advances of modern machines with respect to the method presented by Kennell. The authors describe how a remote attestation procedure, involving…
Violência, evasão e exclusão na educação superior
2019
The present text focuses on a relationship between higher education, institutional and symbolic violence and exclusion, practicing as a challenge based on reflections on the existence of evasion in Brazilian university. Ignoring the educational institution as a direct responsible for these things, this text considers that a logic in University organization and operation helps to enlarge inequalities that provide the mechanisms of evasion; at the same time, it presents itself as a space of reference and a struggle against social inequalities and violence. On a provisional basis, the text stands out that: depending on the execution of educational procedures and practices undertaken by the ins…
Le renouvellement du contrôle juridictionnel de l’administration au moyen du recours pour excès de pouvoir
2017
The role of the administrative judge (the excess of power) has evolved due to the implementation of the various texts adopted recently as well as the developments in the case-law in recent years. In many areas, its role now goes beyond the mere confrontation of an administrative act with the rule of law. At the heart of the annulment decision is a statement and an assessment of the facts, apart from the interpretation of the law, which were usually separated by the principle of separation between the administration and its judge.Some jurisprudence which has become very classical, as well as others more recent, can be considered as characteristic manifestations of this new tendency of the ju…
Preventing reverse engineering of native and managed programs
2015
One of the important aspects of protecting software from attack, theft of algorithms, or illegal software use is eliminating the possibility of performing reverse engineering. One common method used to deal with these issues is code obfuscation. However, it is proven to be ineffective. Code encryption is a much more effective means of defying reverse engineering, but it requires managing a cryptographic key available to none but the permissible users. The thesis presents a system for managing cryptographic keys in a protected environment and supporting execution of encrypted code. The system has strong security guarantees. In particular, the cryptographic keys are never stored on the target…