Sie befinden Sich nicht im Netzwerk der Universität Paderborn. Der Zugriff auf elektronische Ressourcen ist gegebenenfalls nur via VPN oder Shibboleth (DFN-AAI) möglich. mehr Informationen...
Ergebnis 11 von 145

Details

Autor(en) / Beteiligte
Titel
Protocols for a Two-Tiered Trusted Computing Base
Ist Teil von
  • Computer Security – ESORICS 2022, p.229-249
Ort / Verlag
Cham: Springer Nature Switzerland
Quelle
Alma/SFX Local Collection
Beschreibungen/Notizen
  • A trusted computing base (TCB) is the minimum set of hardware and software components which are inherently trusted by a platform, and upon which more complex secure services can be built. The TCB is secure by definition, and it is typically implemented through hardened hardware components, which ensure that their secret data cannot be compromised. In this paper, we propose and investigate a two-tier TCB architecture that benefits both from a small hardened ‘minimal’ TCB, but also offers the possibility of integrating complex security services into an ‘extended’ TCB. Our design includes a collection of protocols to ensure (1) secure update of the components, (2) secure boot of the platform, (3) attestation, and (4) detection of powerful attackers that can corrupt memory regions together with a (highly probable) platform recovery mechanism after such an attack. The protocols have been formally modelled, and we provide a collection of security properties that have been verified using the automatic protocol verifier ProVerif.
Sprache
Englisch
Identifikatoren
ISBN: 9783031171420, 303117142X
ISSN: 0302-9743
eISSN: 1611-3349
DOI: 10.1007/978-3-031-17143-7_12
Titel-ID: cdi_springer_books_10_1007_978_3_031_17143_7_12

Weiterführende Literatur

Empfehlungen zum selben Thema automatisch vorgeschlagen von bX