A note on high-integrity PC bootstrapping

نویسنده

  • Frederick B. Cohen
چکیده

In this paper, we describe two techniques for assuring a high integrity startup in a PC based computing environment. We begin with background information on PC startup procedures and current integrity threats against normal PC startup. We then describe a sound technique for assuring a high integrity startup and the basis for its soundness. Next we show a second method which is not sound, but which works well against attacks not specifically directed against this defense.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Secure and Reliable Bootstrap Architecture

In a computer system the integrity of lower layers is treated as axiomatic by higher layers Under the pre sumption that the hardware comprising the machine the lowest layer is valid integrity of a layer can be guaranteed if and only if the integrity of the lower layers is checked and transitions to higher layers occur only after integrity checks on them are complete The resulting integrity chai...

متن کامل

Nonsymmetric Bootstrap Confidence Intervals Using SASlIML® Software on a PC

In this paper, PC SAS/IML® modules are developed which calculate percentile method confidence intervals and vanants. The modules will work on distributions of parameters generated by any Monte Carlo technique, Including the bootstrap.

متن کامل

Faster Bootstrapping of FHE over the Integers

Bootstrapping in fully homomorphic encryption (FHE) over the integers is a homomorphic evaluation of the squashed decryption function suggested by van Dijk et al. The typical approach for the bootstrapping is representing the decryption function as a binary circuit with a fixed message space. All bootstrapping methods in FHEs over the integers use this approach; however, these methods require t...

متن کامل

An Overview of Secure Data Aggregation in Wireless Sensor Network

Data Aggregation is widely used technique in wireless sensor networks (WSNs). The Security become a major issue, data confidentiality and data integrity in data aggregation. data aggregation should be incorporated in order to save energy. In this paper, the secure data aggregation schemes are categorized into hop by hop aggregation and end to end aggregation, and then the secure data aggregatio...

متن کامل

Molecular basis for the immunosuppressive action of stearic acid on T cells.

Studies were performed to determine the mechanism by which stearic acid (18:0) selectively inhibits T-dependent immune responses in vitro. Incubation of mitogen-activated B and T cells with 18:0 resulted in dissimilar patterns of incorporation of the saturated fatty acid into their membranes. High-performance liquid chromatography (HPLC) analyses of T cells showed an accumulation of disaturated...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Computers & Security

دوره 10  شماره 

صفحات  -

تاریخ انتشار 1991