The BIOS's security threats to computer system are analyzed and security requirements for firmware BIOS are summarized in this paper. Through discussion about TCG' s trust transitivity, a new approach about CRTM implementation based on BIOS is developed. In this paper, we also put forward a new trusted BIOS architecture-UTBIOS which is built on Intel Framework for EFI/UEFI. The trustworthiness of UTBIOS is based on trusted hardware TPM. In UTBIOS, trust encapsulation and trust measurement are used to construct pre-OS trust chain. Performance of trust measurement is also analyzed in the end. © Springer-Verlag Berlin Heidelberg 2007.
CITATION STYLE
Zhou, Z. L., & Xu, R. S. (2007). BIOS security analysis and a kind of trusted BIOS. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4861 LNCS, pp. 427–437). Springer Verlag. https://doi.org/10.1007/978-3-540-77048-0_33
Mendeley helps you to discover research relevant for your work.