Title :
Formal developing of security bootstrap on TPM
Author :
Chao, Yu ; Meng-ting, Yuan
Author_Institution :
Inst. of Neusoft Inf. & Technol., ChengDu, China
Abstract :
Security bootstrap is pretty important to the platform security, and trusted bootstrap is significant in the research of trusted computing. However, works on trusted bootstrap are relatively less. In this paper, we present a trusted bootstrap framework and related measurements from both hardware and software aspects based on trusted computing. We modify trust chain defined by TCG slightly by introducing a new component called PMBR, to implement a more flexible security bootstrap. Our approach can automatically recover programs being attacked. Furthermore, the “attack codes” inserted by attackers and their corresponding physical addresses can be precisely extracted and located respectively. On the other, we use B method as the formal tool to develop PMBR, which can generate the execution code automatically.
Keywords :
computer bootstrapping; formal specification; security of data; B method; PMBR; TCG; TPM; formal development; security bootstrap; trusted bootstrap; trusted computing; Fingerprint recognition; Size measurement; Bootstrap; Security; Trusted;
Conference_Titel :
Advanced Computer Theory and Engineering (ICACTE), 2010 3rd International Conference on
Conference_Location :
Chengdu
Print_ISBN :
978-1-4244-6539-2
DOI :
10.1109/ICACTE.2010.5579188