Secure bootstrap is not enough: shoring up the trusted computing base

  • Authors:
  • James Hendricks;Leendert van Doorn

  • Affiliations:
  • Carnegie Mellon University, Pittsburgh, PA;IBM T.J. Watson Research Center, Hawthorne, NY

  • Venue:
  • Proceedings of the 11th workshop on ACM SIGOPS European workshop
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

We propose augmenting secure boot with a mechanism to protect against compromises to field-upgradeable devices. In particular, secure boot standards should verify the firmware of all devices in the computer, not just devices that are accessible by the host CPU. Modern computers contain many autonomous processing elements, such as disk controllers, disks, network adapters, and coprocessors, that all have field-upgradeable firmware and are an essential component of the computer system's trust model. Ignoring these devices opens the system to attacks similar to those secure boot was engineered to defeat.