DocumentCode :
517722
Title :
Security Bootstrap Based on Trusted Computing
Author :
Chao, Yu ; Meng-Ting, Yuan
Author_Institution :
Inst. of Neusoft Inf. & Technol., ChengDu, China
Volume :
1
fYear :
2010
fDate :
24-25 April 2010
Firstpage :
486
Lastpage :
489
Abstract :
Security bootstrap is pretty important to the platform security, and trusted bootstrap is significant in the research of trusted computing. However, works on trusted bootstrap are relatively less. In this paper, we present a trusted bootstrap framework and related measurements from both hardware and software aspects based on trusted computing. We modify trust chain defined by TCG slightly by introducing a new component called PMBR, to implement a more flexible security bootstrap. Our approach can automatically recover programs being attack-ed. Furthermore, the “attack codes” inserted by attackers and their corresponding physical addresses can be precisely extracted and located respectively. On the other, we theoretically prove the security of the modified trust chain. Our experiments show that it can efficiently detect attacks on boot process.
Keywords :
computer bootstrapping; security of data; boot process; modified trust chain; security bootstrap; trusted computing; Chaotic communication; Computer networks; Computer security; Hard disks; Hardware; Information security; Kernel; Protection; Software measurement; Wireless communication; Bootstrap; Security; Trusted;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Networks Security Wireless Communications and Trusted Computing (NSWCTC), 2010 Second International Conference on
Conference_Location :
Wuhan, Hubei
Print_ISBN :
978-0-7695-4011-5
Electronic_ISBN :
978-1-4244-6598-9
Type :
conf
DOI :
10.1109/NSWCTC.2010.121
Filename :
5480809
Link To Document :
بازگشت