• DocumentCode
    2219484
  • Title

    Formal developing of security bootstrap on TPM

  • Author

    Chao, Yu ; Meng-ting, Yuan

  • Author_Institution
    Inst. of Neusoft Inf. & Technol., ChengDu, China
  • Volume
    2
  • fYear
    2010
  • fDate
    20-22 Aug. 2010
  • Abstract
    Security bootstrap is pretty important to the platform security, and trusted bootstrap is significant in the research of trusted computing. However, works on trusted bootstrap are relatively less. In this paper, we present a trusted bootstrap framework and related measurements from both hardware and software aspects based on trusted computing. We modify trust chain defined by TCG slightly by introducing a new component called PMBR, to implement a more flexible security bootstrap. Our approach can automatically recover programs being attacked. Furthermore, the “attack codes” inserted by attackers and their corresponding physical addresses can be precisely extracted and located respectively. On the other, we use B method as the formal tool to develop PMBR, which can generate the execution code automatically.
  • Keywords
    computer bootstrapping; formal specification; security of data; B method; PMBR; TCG; TPM; formal development; security bootstrap; trusted bootstrap; trusted computing; Fingerprint recognition; Size measurement; Bootstrap; Security; Trusted;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Advanced Computer Theory and Engineering (ICACTE), 2010 3rd International Conference on
  • Conference_Location
    Chengdu
  • ISSN
    2154-7491
  • Print_ISBN
    978-1-4244-6539-2
  • Type

    conf

  • DOI
    10.1109/ICACTE.2010.5579188
  • Filename
    5579188