A secure bootstrap based on trusted computing

被引:0
|
作者
Gu, Junkai [1 ]
Ji, Weiyong [1 ]
机构
[1] Changan Univ, Coll Geol Engn & Geomat, Xian 710054, Shanxi, Peoples R China
关键词
Trusted Computing; Trust Chain; TPM; Security;
D O I
10.1109/NISS.2009.78
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A secure bootstrap is critical to boot operating system kernel into a trusted state. This paper presents an approach for the secure bootstrap based on trusted computing technology. The hardware base for our approach is the trusted computer, and the software base is the trust chain defined by Trusted Computing Group (TCG). Each time before the kernel is booted, the integrity of critical files and code are measured first. If the measurement passes, control is transferred to the Master Boot Record (MBR) to perform the common kernel bootstrap process; otherwise the illegally modified files will be automatically recovered.
引用
收藏
页码:502 / 504
页数:3
相关论文
共 50 条
  • [1] Formal analysis of secure bootstrap in trusted computing
    Chen, Shuyi
    Wen, Yingyou
    Zhao, Hong
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 352 - +
  • [2] Research and Implement of Secure Bootstrap for Virtual Machine based on Trusted Computing Platform
    Zhu, Zhiqiang
    Xu, Mingdi
    Zhang, Huanguo
    EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 514 - 519
  • [3] A Secure Trust Model Based on Trusted Computing
    Yin Zhixi
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 170 - 176
  • [4] Secure data management in trusted computing
    Kühn, U
    Kursawe, K
    Lucks, S
    Sadeghi, AR
    Stüble, C
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2005, PROCEEDINGS, 2005, 3659 : 324 - 338
  • [5] Secure VPNs for Trusted Computing Environments
    Schulz, Steffen
    Sadeghi, Ahmad-Reza
    TRUSTED COMPUTING, PROCEEDINGS, 2009, 5471 : 197 - +
  • [6] Trusted computing architecture for secure SOC
    School of Computer Science, National University of Defense Technology, Changsha 410073, China
    Huazhong Ligong Daxue Xuebao, 2008, 11 (44-47):
  • [7] Seal-based secure boot scheme for trusted computing platform
    Song C.
    Peng W.-P.
    Xin Y.
    Luo S.-S.
    Zhu H.-L.
    Journal of China Universities of Posts and Telecommunications, 2010, 17 (SUPPL. 2): : 16 - 21
  • [8] Efficient and Secure Multi-Signature Scheme Based on Trusted Computing
    HAO Liming1
    2.School of Information Security Engineering
    WuhanUniversityJournalofNaturalSciences, 2008, (02) : 180 - 184
  • [9] Trusted Secure Routing Schemes Based on Intelligent Computing: A Brief Review
    Jia, Guoqing
    Sun, Changhui
    Fang, Weidong
    Chen, Wei
    Song, Guannan
    Zhang, Wuxiong
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT V, ICIC 2024, 2024, 14879 : 275 - 284
  • [10] The Role of Trusted Computing in Secure Agent Migration
    Munoz, Antonio
    Mana, Antonio
    Serrano, Daniel
    RCIS 2009: PROCEEDINGS OF THE IEEE INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE, 2009, : 255 - +