BIOS security analysis and a kind of trusted BIOS

  • Authors:
  • ZhenLiu Zhou;RongSheng Xu

  • Affiliations:
  • Network Security Laboratory of High Energy Physics, CAS, China;Network Security Laboratory of High Energy Physics, CAS, China

  • Venue:
  • ICICS'07 Proceedings of the 9th international conference on Information and communications security
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

The BIOS's security threats to computer system are analyzed and security requirements for firmware BIOS are summarized in this paper. Through discussion about TCG's trust transitivity, a new approach about CRTM implementation based on BIOS is developed. In this paper, we also put forward a new trusted BIOS architecture-UTBIOS which is built on Intel Framework for EFI/UEFI. The trustworthiness of UTBIOS is based on trusted hardware TPM. In UTBIOS, trust encapsulation and trust measurement are used to construct pre-OS trust chain. Performance of trust measurement is also analyzed in the end.