DocumentCode
2219484
Title
Formal developing of security bootstrap on TPM
Author
Chao, Yu ; Meng-ting, Yuan
Author_Institution
Inst. of Neusoft Inf. & Technol., ChengDu, China
Volume
2
fYear
2010
fDate
20-22 Aug. 2010
Abstract
Security bootstrap is pretty important to the platform security, and trusted bootstrap is significant in the research of trusted computing. However, works on trusted bootstrap are relatively less. In this paper, we present a trusted bootstrap framework and related measurements from both hardware and software aspects based on trusted computing. We modify trust chain defined by TCG slightly by introducing a new component called PMBR, to implement a more flexible security bootstrap. Our approach can automatically recover programs being attacked. Furthermore, the “attack codes” inserted by attackers and their corresponding physical addresses can be precisely extracted and located respectively. On the other, we use B method as the formal tool to develop PMBR, which can generate the execution code automatically.
Keywords
computer bootstrapping; formal specification; security of data; B method; PMBR; TCG; TPM; formal development; security bootstrap; trusted bootstrap; trusted computing; Fingerprint recognition; Size measurement; Bootstrap; Security; Trusted;
fLanguage
English
Publisher
ieee
Conference_Titel
Advanced Computer Theory and Engineering (ICACTE), 2010 3rd International Conference on
Conference_Location
Chengdu
ISSN
2154-7491
Print_ISBN
978-1-4244-6539-2
Type
conf
DOI
10.1109/ICACTE.2010.5579188
Filename
5579188
Link To Document