منابع مشابه
Attacking the BitLocker Boot Process
We discuss five attack strategies against BitLocker, which target the way BitLocker is using the TPM sealing mechanism. BitLocker is a disk encryption feature included in some versions of Microsoft Windows. It represents a state-of-the-art design, enhanced with TPM support for improved security. We show that, under certain assumptions, a dedicated attacker can circumvent the protection and brea...
متن کاملDelusional Boot: Securing Cloud Hypervisors without Massive Re-engineering
The set of virtual devices offered by a hypervisor to its guest VMs is a virtualization component ripe with security exploits – more than half of all vulnerabilities of today’s hypervisors are found in this codebase. This paper presents Min-V, a hypervisor that disables all virtual devices not critical to running VMs in the cloud. Of the remaining devices, Min-V takes a step further and elimina...
متن کاملImprove the Debian Boot Process Google Summer of Code 2006 State-of-the-Art in the Boot Process First Deliverable
The boot process of unix-like operating systems has been based, until recently, on the init script system used in System 5 [20]. This process is commonly called sysvinit is dominated by the rc script which calls all the processes required for a determined runlevel one after the other in a prespecified order. The order given to this scripts is conservative as there is not information of what scr...
متن کاملSecuring the Process of Insurance Application
Abstract— Legislation in many countries treats electronic signatures similar to autographic ones. Completely electronic processes thereby are theoretically possible but customers today have neither knowledge nor means to issue electronic signatures. This study describes a process that will produce some reliable signature without the need of preparation on side of the customer. As an example the...
متن کاملSecuring Current and Future Process Control Systems
Process control systems (PCSs) are instrumental to the safe, reliable and efficient operation of many critical infrastructure components. However, PCSs increasingly employ commodity information technology (IT) elements and are being connected to the Internet. As a result, they have inherited IT cyber risks, threats and attacks that could affect the safe and reliable operation of infrastructure ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Queue
سال: 2019
ISSN: 1542-7730,1542-7749
DOI: 10.1145/3380774.3382016