6,693 Hits in 1.2 sec

Secure Boot Revisited [chapter]

Steffen Sanwald, Liron Kaneti, Marc Stöttinger, Martin Böhner
This paper investigates the major causes for security weaknesses of secure boot implementations.  ...  The paper provides recommendations to increase the understanding of implementing secure boot securely on both sides and derives a set of reference requirements as starting point for secure boot ECU requirements  ...  However, encrypting content Secure Boot Revisited does not ensure its integrity and authenticity.  ... 
doi:10.13154/294-6662 fatcat:lwrtu54grrg7jnqs7c3kqo5rli

Reflections on trusting trust revisited

Diomidis Spinellis
2003 Communications of the ACM  
The recent attack modifies the saved data of a particular game in a way that renders the trusted game into an untrusted agent that can then be used to boot Linux.  ...  "Trusted Computing" (TC) platforms include specialized hardware or a processor that can monitor a system's boot process to ensure the computer is based on appropriately certified hardware and software.  ... 
doi:10.1145/777313.777347 fatcat:2uzbtl3tpzewxeoh7wkg4mbcuy

D4.2 - Remote attestation of workloads in ITEEs

RISE Research Institutes Of Sweden AB, UBITECH, SECURA BV
2020 Zenodo  
Some important components in trusted computing are • Secure boot: boot into a well-defined and trusted configuration • Strong memory isolation: provide memory isolated from other components and interfaces  ...  We will revisit this subject in Section 3.2. Attestation We have briefly looked into how attestation in TPM works. In the following we will revisit attestation, this time as a generic operation.  ...  As an example, the TPM trusted boot is a layered attester with the layers being components of the boot sequence (firmware, bootloader, OS, …).  ... 
doi:10.5281/zenodo.4022363 fatcat:cwnz3pyc7rhqdervqtumwl73aa

Chrome book Firmware Internals [chapter]

Jiming Sun, Marc Jones, Stefan Reinauer, Vincent Zimmer
2015 Embedded Firmware Solutions  
You should revisit the previous chapter for specific information about the internals of coreboot.  ...  Chrome OS devices use the Google verified boot security library for the chain of trust, which starts in write-protected coreboot romstage.  ...  The EC boots its RO firmware and powers on the AP. 2. The AP boots its RO firmware. 3. The AP verifies its RW firmware and jumps to it. 4. The EC computes a hash of its RW firmware. 5.  ... 
doi:10.1007/978-1-4842-0070-4_5 fatcat:j46oelfctjb5za23lwe7fp3s2i

Page 35 of All the Year Round Vol. 11, Issue 280 [page]

1874 All the Year Round  
boots behind him.  ...  At all events the fall was mortal, and the first proceeding on the part of Franz was to secure the box and the handkerchief, and to retreat as fast as his load would permit him, leaving in his haste the  ... 

The Name Solenopsis

1903 Nature  
After a while he returned to the boot-room and showed no signs of revisiting the box. He was then taken for a twelve-mil e run in the country.  ...  Eager as he w as to secure the he did not reason " The way to secure the meat is to hft the latch ." I have described the experiment in detail details are, as it a ppears to me, of great ance..  ... 
doi:10.1038/067559b0 fatcat:oc3kiolagnbkbmtguphh5v4b5q

Implementing Trust in Cloud Infrastructures

Ricardo Neisse, Dominik Holling, Alexander Pretschner
2011 2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing  
We evaluate both security and performance of this system.  ...  Building on the analysis of several relevant attack scenarios, our system is implemented on top of the Xen Cloud Platform and makes use of trusted computing technology to provide security guarantees.  ...  EXAMPLE REVISITED To illustrate how BonaFides helps secure a cloud infrastructure, we revisit the example described in §I where a service provider S runs its service on the hardware of an infrastructure  ... 
doi:10.1109/ccgrid.2011.35 dblp:conf/ccgrid/NeisseHP11 fatcat:pxxpp3adfvaific2ybe2tkg2uy

Security architectures revisited

Hermann Härtig
2002 Proceedings of the 10th workshop on ACM SIGOPS European workshop: beyond the PC - EW10  
These include small interface technologies, access-control contracts, tunneling, secure booting, effective resource control, and virtual machines.  ...  The knowledge in technologies needed to build secure platforms, or Security Architectures, has significantly matured over the recent years.  ...  It does not address secure booting techniques to prevent that kind of attacks.  ... 
doi:10.1145/1133373.1133376 dblp:conf/sigopsE/Hartig02 fatcat:rwp6m2qmmraclcf2nwjdltr2ja

Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors [chapter]

Steffen Schulz, André Schaller, Florian Kohnhäuser, Stefan Katzenbeisser
2017 Lecture Notes in Computer Science  
In Boot Attestation, software integrity measurements are immediately committed to during boot, thus relaxing the traditional requirement for secure storage and reporting.  ...  require custom secure hardware extensions that are difficult to adopt across IoT vendors.  ...  We will revisit this property when implementing our Root of Trust (RoT) in Section 6.  ... 
doi:10.1007/978-3-319-66399-9_24 fatcat:wdg4hflljbg5zbzyv6cc2ejuhi

John Darling, a New York Munchausen

Lt. Herbert Halpert
1944 Journal of American Folklore  
I first heard of John Darling and other local folk heroes on these trips, but made little effort to secure more than a few of the tales told.  ...  Thompson had published seven of John Darling’s stories in his book, Body, Boots & Britches (Philadelphia, 1940, 131-5), and presented some evidence that Darling had once actually lived in Sullivan County  ... 
doi:10.2307/535878 fatcat:azovs7q3gnhivhuvqmex3mrifm

Multi-layer Attestation for Internet of Things using Blockchain

2020 International Journal of Engineering and Advanced Technology  
Sine all such security primitives are either architecture or manufacturer specific it is not possible to build common unified attestation scheme for all constituent IoT devices in a typical IoT network  ...  PROBLEM STATEMENT In the light of above-mentioned multiple research trends for IoT attestation authors attempt to revisit definition of what needs to secured or attested as first step and subsequently  ...  measures like session based key for securing exchanges.  ... 
doi:10.35940/ijeat.c4719.029320 fatcat:zes3y66cxbd6zftsg6kzcgypna

Front Matter [chapter]

K. J. Boote, J. M. Bennett, T. R. Sinclair, G. M. Paulsen
1994 Physiology and Determination of Crop Yield  
Knowledge of plant processes and controlling mechanisms increased dramatically during the intervening 24 years since that symposium and it was appropriate to revisit this topic.  ...  Crop responses to climate change, air pollution and ultraviolet irradiance were highlighted in this symposium because of their possible impacts on food security and the need to minimize effects of human  ... 
doi:10.2134/1994.physiologyanddetermination.frontmatter fatcat:pukl6g74wbhjzoc2xqqzjckkx4

Page 421 of Critical Review; Or, Annals of Literature Vol. 9, Issue 4 [page]

1806 Critical Review; Or, Annals of Literature  
It will easily be imagined that such a proposal, whigh gave him an opportunity of revisiting at once his native country, and the ebject of his love, could not failto be bighly agree- able.Shortly after  ...  nation, which had long been weary of his tyrannical sway, and that of his father, hastened to resume that ancient and free form of government by which it bad formerly been distia- guished, and which secured  ... 

Page 336 of None Vol. 145, Issue 3777 [page]

1928 None  
., ADELPHI, LONDON, W.C.2 A Security which does not Depreciate is unequalled. HOLBORN BARS, LONDON, E.C.1.  ...  HASTINGS Scandinavia Revisited—Finland By Lieut.-Col. NEWMAN CRAIG, D.S.O. The Transport Problem in Australia By Sir GEORGE C. BUCHANAN, K.C.L.E.  ... 

Intel's Embedded Solutions: from Management to Security [chapter]

Xiaoyu Ruan
2014 Platform Embedded Security Technology Revealed  
In the next section, we briefly revisit the 2009 AMT book.  ...  The initial boot block is a firmware module loaded before the BIOS to facilitate the secure boot path.  ... 
doi:10.1007/978-1-4302-6572-6_2 fatcat:753ovmpkhnfunpbxgyfbys2bni
« Previous Showing results 1 — 15 out of 6,693 results