Securing the Boot Process

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Attacking the BitLocker Boot Process

We discuss five attack strategies against BitLocker, which target the way BitLocker is using the TPM sealing mechanism. BitLocker is a disk encryption feature included in some versions of Microsoft Windows. It represents a state-of-the-art design, enhanced with TPM support for improved security. We show that, under certain assumptions, a dedicated attacker can circumvent the protection and brea...

متن کامل

Delusional Boot: Securing Cloud Hypervisors without Massive Re-engineering

The set of virtual devices offered by a hypervisor to its guest VMs is a virtualization component ripe with security exploits – more than half of all vulnerabilities of today’s hypervisors are found in this codebase. This paper presents Min-V, a hypervisor that disables all virtual devices not critical to running VMs in the cloud. Of the remaining devices, Min-V takes a step further and elimina...

متن کامل

Improve the Debian Boot Process Google Summer of Code 2006 State-of-the-Art in the Boot Process First Deliverable

The boot process of unix-like operating systems has been based, until recently, on the init script system used in System 5 [20]. This process is commonly called sysvinit is dominated by the rc script which calls all the processes required for a determined runlevel one after the other in a prespecified order. The order given to this scripts is conservative as there is not information of what scr...

متن کامل

Securing the Process of Insurance Application

Abstract— Legislation in many countries treats electronic signatures similar to autographic ones. Completely electronic processes thereby are theoretically possible but customers today have neither knowledge nor means to issue electronic signatures. This study describes a process that will produce some reliable signature without the need of preparation on side of the customer. As an example the...

متن کامل

Securing Current and Future Process Control Systems

Process control systems (PCSs) are instrumental to the safe, reliable and efficient operation of many critical infrastructure components. However, PCSs increasingly employ commodity information technology (IT) elements and are being connected to the Internet. As a result, they have inherited IT cyber risks, threats and attacks that could affect the safe and reliable operation of infrastructure ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Queue

سال: 2019

ISSN: 1542-7730,1542-7749

DOI: 10.1145/3380774.3382016