A secure bootstrap based on trusted computing

被引:0
|
作者
Gu, Junkai [1 ]
Ji, Weiyong [1 ]
机构
[1] Changan Univ, Coll Geol Engn & Geomat, Xian 710054, Shanxi, Peoples R China
关键词
Trusted Computing; Trust Chain; TPM; Security;
D O I
10.1109/NISS.2009.78
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A secure bootstrap is critical to boot operating system kernel into a trusted state. This paper presents an approach for the secure bootstrap based on trusted computing technology. The hardware base for our approach is the trusted computer, and the software base is the trust chain defined by Trusted Computing Group (TCG). Each time before the kernel is booted, the integrity of critical files and code are measured first. If the measurement passes, control is transferred to the Master Boot Record (MBR) to perform the common kernel bootstrap process; otherwise the illegally modified files will be automatically recovered.
引用
收藏
页码:502 / 504
页数:3
相关论文
共 50 条
  • [31] Construction of embedded secure terminal and multimedia database based on trusted computing technology and wireless network
    Xiao, Kun
    ALEXANDRIA ENGINEERING JOURNAL, 2021, 60 (05) : 4223 - 4230
  • [32] Highly Secure Mobile Devices Assisted with Trusted Cloud Computing Environments
    Oh, Doohwan
    Kim, Ilkyu
    Kim, Keunsoo
    Lee, Sang-Min
    Ro, Won Woo
    ETRI JOURNAL, 2015, 37 (02) : 348 - 358
  • [33] Secure Mobile Payment employing Trusted Computing on TrustZone Enabled Platforms
    Zheng, Xianyi
    Yang, Lulu
    Shi, Gang
    Meng, Dan
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 1944 - 1950
  • [34] General Secure Function Evaluation Using Standard Trusted Computing Hardware
    Tate, Stephen R.
    Vishwanathan, Roopa
    2011 NINTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, 2011, : 221 - 228
  • [35] A Secure and Reliable Platform Configuration Change Reporting Mechanism for Trusted Computing Enhanced Secure Channels
    Dietrich, Kurt
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2137 - 2142
  • [36] Quantum-Secure Communication for Trusted Edge Computing with IoT Devices
    Kornaros, George
    Berki, Georgia
    Grammatikakis, Miltos
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP SEC 2023, 2024, 679 : 163 - 176
  • [38] Best Practice for Developing Secure and Trusted Enterprise Storage & Computing Products
    Tang, Xuan
    2018 IEEE CYBERSECURITY DEVELOPMENT CONFERENCE (SECDEV 2018), 2018, : 142 - 142
  • [39] Integrity Measurement based on Trusted Computing
    Li, Yiming
    Ba, Haihe
    Ren, Jiangchun
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING FOR MECHANICS AND MATERIALS, 2015, 21 : 956 - 959
  • [40] IaaS Architecture based on Trusted Computing
    Zhang Wenbo
    Bao Zhenshan
    Li Jian
    Duan Lijuan
    APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 399 - 402