Sciweavers

Share
SIGOPSE
2004
ACM

Secure bootstrap is not enough: shoring up the trusted computing base

10 years 9 months ago
Secure bootstrap is not enough: shoring up the trusted computing base
We propose augmenting secure boot with a mechanism to protect against compromises to field-upgradeable devices. In particular, secure boot standards should verify the firmware of all devices in the computer, not just devices that are accessible by the host CPU. Modern computers contain many autonomous processing elements, such as disk controllers, disks, network adapters, and coprocessors, that all have field-upgradeable firmware and are an essential component of the computer system’s trust model. Ignoring these devices opens the system to attacks similar to those secure boot was engineered to defeat.
James Hendricks, Leendert van Doorn
Added 30 Jun 2010
Updated 30 Jun 2010
Type Conference
Year 2004
Where SIGOPSE
Authors James Hendricks, Leendert van Doorn
Comments (0)
books