A secure bootstrap based on trusted computing

被引:0
|
作者
Gu, Junkai [1 ]
Ji, Weiyong [1 ]
机构
[1] Changan Univ, Coll Geol Engn & Geomat, Xian 710054, Shanxi, Peoples R China
关键词
Trusted Computing; Trust Chain; TPM; Security;
D O I
10.1109/NISS.2009.78
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A secure bootstrap is critical to boot operating system kernel into a trusted state. This paper presents an approach for the secure bootstrap based on trusted computing technology. The hardware base for our approach is the trusted computer, and the software base is the trust chain defined by Trusted Computing Group (TCG). Each time before the kernel is booted, the integrity of critical files and code are measured first. If the measurement passes, control is transferred to the Master Boot Record (MBR) to perform the common kernel bootstrap process; otherwise the illegally modified files will be automatically recovered.
引用
收藏
页码:502 / 504
页数:3
相关论文
共 50 条
  • [41] A Trusted Bootstrap Scheme on EFI
    Zhang, Rui
    Liu, Jiqiang
    Peng, Shuanghe
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 200 - 204
  • [42] An analysis of a secure system based on trusted components
    Lindqvist, U
    Olovsson, T
    Jonsson, E
    COMPASS '96 - PROCEEDINGS OF THE ELEVENTH ANNUAL CONFERENCE ON COMPUTER ASSURANCE: SYSTEMS INTEGRITY, SOFTWARE SAFETY, PROCESS SECURITY, 1996, : 213 - 223
  • [43] A Trusted Mobile Payment Environment Based on Trusted Computing and Virtualization Technology
    WANG Juan
    LIN Wutao
    LI Haoyu
    DU Bianxia
    MENG Ke
    WANG Jiang
    Wuhan University Journal of Natural Sciences, 2014, 19 (05) : 379 - 384
  • [44] The research of Trusted Computing based on the model of trusted Meta data of BSCM
    Zhong, Liu
    2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 941 - 945
  • [45] Secure Distributed Computing on Untrusted Fog Infrastructures Using Trusted Linux Containers
    Bazm, Mohammad-Mahdi
    Lacoste, Marc
    Sudholt, Mario
    Menaud, Jean-Marc
    2018 16TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM 2018), 2018, : 239 - 242
  • [46] A secure multi-party computing and scenario application for trusted data circulation
    Wang, Dan-Chen
    Xu, Yang
    Zhang, Xiao-Song
    DEVELOPMENTS OF ARTIFICIAL INTELLIGENCE TECHNOLOGIES IN COMPUTATION AND ROBOTICS, 2020, 12 : 369 - 377
  • [47] Identity anonymity for grid computing coordination based on trusted computing
    Shi, Zhiguo
    He, Yeping
    Huai, Xiaoyong
    Zhang, Hong
    SIXTH INTERNATIONAL CONFERENCE ON GRID AND COOPERATIVE COMPUTING, PROCEEDINGS, 2007, : 403 - +
  • [48] A Secure and Trusted Fog Computing Approach based on Blockchain and Identity Federation for a Granular Access Control in IoT Environments
    El Haddouti, Samia
    Ech-Cherif El Kettani, Mohamed Dafir
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (03) : 575 - 584
  • [49] Security strategy of DRM based on trusted computing
    Yan, Jianhong
    Peng, Xinguang
    Journal of Computational Information Systems, 2011, 7 (09): : 3226 - 3234
  • [50] A trusted computing model based on code authorization
    Wei, Guoheng
    Zhou, Xueguang
    Zhang, Huanguo
    2008 INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING AND 2008 INTERNATIONAL PACIFIC WORKSHOP ON WEB MINING AND WEB-BASED APPLICATION, 2008, : 495 - +