Please use this identifier to cite or link to this item: https://www.um.edu.mt/library/oar/handle/123456789/119051
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAbela, Robert-
dc.contributor.authorColombo, Christian-
dc.contributor.authorCurmi, Axel-
dc.contributor.authorFenech, Mattea-
dc.contributor.authorVella, Mark Joseph-
dc.contributor.authorFerrando, Angelo-
dc.date.accessioned2024-02-23T16:33:23Z-
dc.date.available2024-02-23T16:33:23Z-
dc.date.issued2023-
dc.identifier.citationAbela, R., Colombo, C., Curmi, A., Fenech, M., Vella M., & Ferrando A. (2023). Runtime Verification for Trustworthy Computing. Proceedings of the Third Workshop on Agents and Robots for reliable Engineered Autonomy (AREA), Krakow.en_GB
dc.identifier.urihttps://www.um.edu.mt/library/oar/handle/123456789/119051-
dc.description.abstractAutonomous and robotic systems are increasingly being trusted with sensitive activities with potentially serious consequences if that trust is broken. Runtime verification techniques present a natural source of inspiration for monitoring and enforcing the desirable properties of the communication protocols in place, providing a formal basis and ways to limit intrusiveness. A recently proposed approach, RV-TEE, shows how runtime verification can enhance the level of trust to the Rich Execution Environment (REE), consequently adding a further layer of protection around the Trusted Execution Environment (TEE). By reflecting on the implication of deploying RV in the context of trustworthy computing, we propose practical solutions to two threat models for the RV-TEE monitoring process: one where the adversary has gained access to the system without elevated privileges, and another where the adversary gains all privileges to the host system but fails to steal secrets from the TEE.en_GB
dc.language.isoenen_GB
dc.rightsinfo:eu-repo/semantics/restrictedAccessen_GB
dc.subjectComputer software -- Verificationen_GB
dc.subjectComputer engineeringen_GB
dc.subjectFormal methods (Computer science)en_GB
dc.subjectComputer logicen_GB
dc.subjectComputer software -- Developmenten_GB
dc.titleRuntime verification for trustworthy computingen_GB
dc.typeconferenceObjecten_GB
dc.rights.holderThe copyright of this work belongs to the author(s)/publisher. The rights of this work are as defined by the appropriate Copyright Legislation or as modified by any successive legislation. Users may access this work and can make use of the information contained in accordance with the Copyright Legislation provided that the author must be properly acknowledged. Further distribution or reproduction in any format is prohibited without the prior permission of the copyright holderen_GB
dc.bibliographicCitation.conferencenameProceedings of the Third Workshop on Agents and Robots for reliable Engineered Autonomy (AREA)en_GB
dc.bibliographicCitation.conferenceplaceKrakow, Poland. 02-05/10/2023.en_GB
dc.description.reviewedpeer-revieweden_GB
Appears in Collections:Scholarly Works - FacICTCS

Files in This Item:
File Description SizeFormat 
Runtime_verification_for_trustworthy_computing.pdf
  Restricted Access
561.6 kBAdobe PDFView/Open Request a copy


Items in OAR@UM are protected by copyright, with all rights reserved, unless otherwise indicated.