Abstract
The BIOS’s security threats to computer system are analyzed and security requirements for firmware BIOS are summarized in this paper. Through discussion about TCG’s trust transitivity, a new approach about CRTM implementation based on BIOS is developed. In this paper, we also put forward a new trusted BIOS architecture-UTBIOS which is built on Intel Framework for EFI/UEFI. The trustworthiness of UTBIOS is based on trusted hardware TPM. In UTBIOS, trust encapsulation and trust measurement are used to construct pre-OS trust chain. Performance of trust measurement is also analyzed in the end.
Chapter PDF
References
Arbaugh, W.A., Farber, D.J., Smith, J.M.: A Secure and Reliable Bootstrap Architecture. In: Procedings, 1997 IEEE Symposium on Security and Privacy (4-7 May 1997) pp. 65–71 (1997)
Kozen, D.: Efficient Code Certification. Technical Report98-1661,Computer Science Department, Cornell University (January 1998)
Adelstein, F., Stillerman, M., Kozen, D.: Malicious Code Detection for Open Firmware. In: Computer Security Applications Conference. Proceedings 18th Annual (9-13 Decembr 2002) pp. 403–412 (2002)
Heasman, J.: Implementing and Detecting an ACPI BIOS Rootkit, http://www.ngssoftware.com/jh_bhf2006.pdf
Clark, D.D., Wilson, D.R., Comparison, A.: A Comparison of Commercial and Military Computer Security Policies. In: Proceedings of the 1987 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Los Alamitos (1987)
The Unified, E.F.I.: Forum. Unified Extensible Firmware Interface Specification Version 2.0 (January 31, 2006), http://www.uefi.org
Intel Corporation. Intel Platform Innovation Framework for EFI Architecture Specification Version 0.9 (September 16, 2003)
TCG. TCG Infrastructure Architecture Version 1.0. https://www.trustedcomputinggroup.org/specs/
TianoCore, https://www.tianocore.org/
UEFI, https://www.uefi.org/
Intel Corporation. Intel Platform Innovation Framework for EFI Firmware File System Specification Version 0.9 (September 16, 2003), http://www.intel.com/technology/framework/
TCG. TPM Main Specification Part 1,2,3 Version 1.2 (March 29, 2006) https://www.trustedcomputinggroup.org/specs/
TCG. TCG Specification Architecture Overview, https://www.trustedcomputinggroup.org
TCG.TCG EFI Platform Version 1.0 Final Revision 1.00, https://www.trustedcomputinggroup.org
TCG.TCG EFI Protocol Version 1.0 Final Revision 1.00, https://www.trustedcomputinggroup.org
Sinosun. SSX35, T.P.M.: Datasheet Version 1.2
Menasce, D.A.: Security Performance[J]. IEEE Internet Computing 7(3), 84–87 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhou, Z., Xu, R. (2007). BIOS Security Analysis and a Kind of Trusted BIOS. In: Qing, S., Imai, H., Wang, G. (eds) Information and Communications Security. ICICS 2007. Lecture Notes in Computer Science, vol 4861. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77048-0_33
Download citation
DOI: https://doi.org/10.1007/978-3-540-77048-0_33
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-77047-3
Online ISBN: 978-3-540-77048-0
eBook Packages: Computer ScienceComputer Science (R0)