2021
DOI: 10.3390/info12090357
|View full text |Cite
|
Sign up to set email alerts
|

P2ISE: Preserving Project Integrity in CI/CD Based on Secure Elements

Abstract: Over the past decade, software development has evolved from a rigid, linear process to a highly automated and flexible one, thanks to the emergence of continuous integration and delivery environments. Nowadays, more and more development teams rely on such environments to build their complex projects, as the advantages they offer are numerous. On the security side, however, most environments seem to focus on authentication, neglecting other critical aspects, such as the integrity of the source code and the comp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
4

Relationship

2
8

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 34 publications
0
4
0
Order By: Relevance
“…Reducing the latency to meet real-time IoT requirements is another critical area, potentially involving the optimization of blockchain verification processes or the exploration of faster consensus mechanisms. Additionally, inspired by [35], integrating hardware-based security measures such as secure elements and Trusted Execution Environments (TEEs) can significantly bolster the security of IoT devices within the blockchain network. These hardware solutions provide a robust platform for cryptographic operations and secure storage, addressing the physical and logical vulnerabilities in IoT devices.…”
Section: Limitationsmentioning
confidence: 99%
“…Reducing the latency to meet real-time IoT requirements is another critical area, potentially involving the optimization of blockchain verification processes or the exploration of faster consensus mechanisms. Additionally, inspired by [35], integrating hardware-based security measures such as secure elements and Trusted Execution Environments (TEEs) can significantly bolster the security of IoT devices within the blockchain network. These hardware solutions provide a robust platform for cryptographic operations and secure storage, addressing the physical and logical vulnerabilities in IoT devices.…”
Section: Limitationsmentioning
confidence: 99%
“…Researchers usually focus on security within the life cycle of application services. For example, for the security of software deployment, TPM (Trusted Platform Module) computing technology is used to ensure the integrity of program code [1]. For network attacks and system intrusion, attack process identification and prevention techniques are studied.…”
Section: Typical Location Privacy Protection Technologiesmentioning
confidence: 99%
“…This last section describes the implementation of SUKRY in the Raspberry Pi machine. The deployment steps above are useful for future studies in reproducing the experiment [58]. In the near future, the hardware of SUKRY will be packed properly for commercialization purposes.…”
Section: Sukry Implementationmentioning
confidence: 99%