Title :
Security Bootstrap Based on Trusted Computing
Author :
Chao, Yu ; Meng-Ting, Yuan
Author_Institution :
Inst. of Neusoft Inf. & Technol., ChengDu, China
Abstract :
Security bootstrap is pretty important to the platform security, and trusted bootstrap is significant in the research of trusted computing. However, works on trusted bootstrap are relatively less. In this paper, we present a trusted bootstrap framework and related measurements from both hardware and software aspects based on trusted computing. We modify trust chain defined by TCG slightly by introducing a new component called PMBR, to implement a more flexible security bootstrap. Our approach can automatically recover programs being attack-ed. Furthermore, the “attack codes” inserted by attackers and their corresponding physical addresses can be precisely extracted and located respectively. On the other, we theoretically prove the security of the modified trust chain. Our experiments show that it can efficiently detect attacks on boot process.
Keywords :
computer bootstrapping; security of data; boot process; modified trust chain; security bootstrap; trusted computing; Chaotic communication; Computer networks; Computer security; Hard disks; Hardware; Information security; Kernel; Protection; Software measurement; Wireless communication; Bootstrap; Security; Trusted;
Conference_Titel :
Networks Security Wireless Communications and Trusted Computing (NSWCTC), 2010 Second International Conference on
Conference_Location :
Wuhan, Hubei
Print_ISBN :
978-0-7695-4011-5
Electronic_ISBN :
978-1-4244-6598-9
DOI :
10.1109/NSWCTC.2010.121