2016
DOI: 10.1155/2016/4516596
|View full text |Cite
|
Sign up to set email alerts
|

Research on Linux Trusted Boot Method Based on Reverse Integrity Verification

Abstract: Trusted computing aims to build a trusted computing environment for information systems with the help of secure hardware TPM, which has been proved to be an effective way against network security threats. However, the TPM chips are not yet widely deployed in most computing devices so far, thus limiting the applied scope of trusted computing technology. To solve the problem of lacking trusted hardware in existing computing platform, an alternative security hardware USBKey is introduced in this paper to simulate… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
1
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 16 publications
0
1
0
Order By: Relevance
“…Although a number of existing studies only suggest that the three technical approaches of virtualization, walled gardens, and limited separation should be included in a policy-based framework, it is presently also highly recommended that trusted boot should be considered for inclusion in a BYOD policy. This is because trusted boot techniques can help to achieve lower-level protection [60]. This means that lower-level programs can ensure the security of higher-level programs that are to be activated [61].…”
Section: Virtualization Walled Garden Limited Separation Andmentioning
confidence: 99%
“…Although a number of existing studies only suggest that the three technical approaches of virtualization, walled gardens, and limited separation should be included in a policy-based framework, it is presently also highly recommended that trusted boot should be considered for inclusion in a BYOD policy. This is because trusted boot techniques can help to achieve lower-level protection [60]. This means that lower-level programs can ensure the security of higher-level programs that are to be activated [61].…”
Section: Virtualization Walled Garden Limited Separation Andmentioning
confidence: 99%
“…It is the element which is considered as de facto secure. In the case of secure boot this element can be a piece of software like a first stage bootloader [109], [110] or a hardware module like a TPM [46], [50], [111], [112], a smartcard [112], [113] or another hardware module [114], [115]. The next layer is measured by the current one then this measurement is verified.…”
Section: A Backgroundmentioning
confidence: 99%
“…The attacks that the attacker is allowed to perform depend directly on the privilege level of the protection. The protections proposed in the literature use either dedicated hardware (for instance [55], [112], [114], [116]) or a software extension (for instance [46], [109], [117]), see Table 5 for more information. Software level approaches do not protect against an attacker with hardware to the However, even the approaches using some dedicated hardware do not address all hardware attacks.…”
Section: ) Adversary Modelmentioning
confidence: 99%
See 2 more Smart Citations