IEEE Internet Computing
Malicious Code Detection for Open Firmware
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
Efficient Code Certification
A secure and reliable bootstrap architecture
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Application of trusted computing in automation to prevent product piracy
TRUST'10 Proceedings of the 3rd international conference on Trust and trustworthy computing
Hi-index | 0.00 |
The BIOS's security threats to computer system are analyzed and security requirements for firmware BIOS are summarized in this paper. Through discussion about TCG's trust transitivity, a new approach about CRTM implementation based on BIOS is developed. In this paper, we also put forward a new trusted BIOS architecture-UTBIOS which is built on Intel Framework for EFI/UEFI. The trustworthiness of UTBIOS is based on trusted hardware TPM. In UTBIOS, trust encapsulation and trust measurement are used to construct pre-OS trust chain. Performance of trust measurement is also analyzed in the end.