A secure bootstrap based on trusted computing

被引:0
|
作者
Gu, Junkai [1 ]
Ji, Weiyong [1 ]
机构
[1] Changan Univ, Coll Geol Engn & Geomat, Xian 710054, Shanxi, Peoples R China
关键词
Trusted Computing; Trust Chain; TPM; Security;
D O I
10.1109/NISS.2009.78
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A secure bootstrap is critical to boot operating system kernel into a trusted state. This paper presents an approach for the secure bootstrap based on trusted computing technology. The hardware base for our approach is the trusted computer, and the software base is the trust chain defined by Trusted Computing Group (TCG). Each time before the kernel is booted, the integrity of critical files and code are measured first. If the measurement passes, control is transferred to the Master Boot Record (MBR) to perform the common kernel bootstrap process; otherwise the illegally modified files will be automatically recovered.
引用
收藏
页码:502 / 504
页数:3
相关论文
共 50 条
  • [21] A Secure Distributed Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET
    Wang Xingfu
    Lu Qiwei
    Xiong Yan
    Miao Fuyou
    Huang Wenchao
    Liu Tao
    Wu Xuangou
    CHINESE JOURNAL OF ELECTRONICS, 2014, 23 (02) : 284 - 290
  • [22] Secure VANETs: Trusted Communication Scheme between Vehicles and Infrastructure Based on Fog Computing
    Arif, Muhammad
    Wang, Guojun
    Balas, Valentina Emilia
    STUDIES IN INFORMATICS AND CONTROL, 2018, 27 (02): : 235 - 246
  • [23] Guest Editorial Special Issue on Blockchain-Based Secure and Trusted Computing for IoT
    Li, Shancang
    Yuan, Yong
    Zhang, Jun Jason
    Buchanan, Bill
    Liu, Erwu
    Ramadoss, Ramesh
    IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2019, 6 (06) : 1369 - 1372
  • [24] A Secure Trust Model for P2P Systems Based on Trusted Computing
    郝黎明
    杨树堂
    陆松年
    陈恭亮
    JournalofShanghaiJiaotongUniversity, 2008, (01) : 86 - 90
  • [25] Secure trust model for P2P systems based on trusted computing
    Hao L.-M.
    Yang S.-T.
    Lu S.-N.
    Chen G.-L.
    Journal of Shanghai Jiaotong University (Science), 2008, 13 (1) : 86 - 90
  • [26] A Secure Distributed Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET
    WANG Xingfu
    LU Qiwei
    XIONG Yan
    MIAO Fuyou
    HUANG Wenchao
    LIU Tao
    WU Xuangou
    ChineseJournalofElectronics, 2014, 23 (02) : 284 - 290
  • [27] A Trusted Remote Attestation Model based on Trusted Computing
    Yu, Yue
    Wang, Huaimin
    Liu, Bo
    Yin, Gang
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1504 - 1509
  • [28] Secure Blockchain Platform for Industrial IoT with Trusted Computing Hardware
    Yang Q.
    Wang H.
    Wu X.
    Wang T.
    Zhang S.
    Liu N.
    IEEE Internet of Things Magazine, 2021, 4 (04): : 86 - 92
  • [29] Research on trusted storage based on trusted computing platform
    School of Computer, Wuhan University, Wuhan 430072, China
    不详
    Tongxin Xuebao, 2007, SUPPL. (117-120):
  • [30] Trusted coalition-proof protocol model based on secure multi-part computing
    Cheng, Bai-Liang
    Zeng, Guo-Sun
    Jie, An-Quan
    Tongxin Xuebao/Journal on Communications, 2011, 32 (08): : 23 - 30