A secure bootstrap based on trusted computing

被引:0
|
作者
Gu, Junkai [1 ]
Ji, Weiyong [1 ]
机构
[1] Changan Univ, Coll Geol Engn & Geomat, Xian 710054, Shanxi, Peoples R China
来源
2009 INTERNATIONAL CONFERENCE ON NEW TRENDS IN INFORMATION AND SERVICE SCIENCE (NISS 2009), VOLS 1 AND 2 | 2009年
关键词
Trusted Computing; Trust Chain; TPM; Security;
D O I
10.1109/NISS.2009.78
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A secure bootstrap is critical to boot operating system kernel into a trusted state. This paper presents an approach for the secure bootstrap based on trusted computing technology. The hardware base for our approach is the trusted computer, and the software base is the trust chain defined by Trusted Computing Group (TCG). Each time before the kernel is booted, the integrity of critical files and code are measured first. If the measurement passes, control is transferred to the Master Boot Record (MBR) to perform the common kernel bootstrap process; otherwise the illegally modified files will be automatically recovered.
引用
收藏
页码:502 / 504
页数:3
相关论文
共 50 条
  • [1] A Secure Trust Model Based on Trusted Computing
    Yin Zhixi
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 170 - 176
  • [2] Trusted Secure Routing Schemes Based on Intelligent Computing: A Brief Review
    Jia, Guoqing
    Sun, Changhui
    Fang, Weidong
    Chen, Wei
    Song, Guannan
    Zhang, Wuxiong
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT V, ICIC 2024, 2024, 14879 : 275 - 284
  • [3] Trusted Platforms to secure Mobile Cloud Computing
    Thinh Le Vinh
    Bouzefrane, Samia
    2014 IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2014 IEEE 6TH INTL SYMP ON CYBERSPACE SAFETY AND SECURITY, 2014 IEEE 11TH INTL CONF ON EMBEDDED SOFTWARE AND SYST (HPCC,CSS,ICESS), 2014, : 1068 - 1075
  • [4] The Role of Trusted Computing in Secure Agent Migration
    Munoz, Antonio
    Mana, Antonio
    Serrano, Daniel
    RCIS 2009: PROCEEDINGS OF THE IEEE INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE, 2009, : 255 - +
  • [5] Seal-based secure boot scheme for trusted computing platform
    Song C.
    Peng W.-P.
    Xin Y.
    Luo S.-S.
    Zhu H.-L.
    Journal of China Universities of Posts and Telecommunications, 2010, 17 (SUPPL. 2): : 16 - 21
  • [6] Design and implementation of trusted boot based on a new trusted computing dual-architecture
    Zheng, Chenming
    Li, Jun
    Yao, Xuanxia
    COMPUTERS & SECURITY, 2023, 127
  • [7] A Secure Solution of V2G Communication Based on Trusted Computing
    Wang, Shuai
    Wang, Baoyi
    Zhang, Shaomin
    PROCEEDINGS OF 2018 12TH IEEE INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION (ASID), 2018, : 98 - 102
  • [8] A Secure Distributed Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET
    Wang Xingfu
    Lu Qiwei
    Xiong Yan
    Miao Fuyou
    Huang Wenchao
    Liu Tao
    Wu Xuangou
    CHINESE JOURNAL OF ELECTRONICS, 2014, 23 (02) : 284 - 290
  • [9] A Secure Distributed Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET
    WANG Xingfu
    LU Qiwei
    XIONG Yan
    MIAO Fuyou
    HUANG Wenchao
    LIU Tao
    WU Xuangou
    Chinese Journal of Electronics, 2014, 23 (02) : 284 - 290
  • [10] Secure trust model for P2P systems based on trusted computing
    Hao L.-M.
    Yang S.-T.
    Lu S.-N.
    Chen G.-L.
    Journal of Shanghai Jiaotong University (Science), 2008, 13 (1) : 86 - 90