International audienceBoot firmware, like UEFI-compliant firmware, has been the target of numerous attacks, giving the attacker control over the entire system while being undetected. The measured boot mechanism of a computer platform ensures its integrity by using cryptographic measurements to detect such attacks. This is typically performed by relying on a Trusted Platform Module (TPM). Recent work, however, shows that vendors do not respect the specifications that have been devised to ensure the integrity of the firmware’s loading process. As a result, attackers may bypass such measurement mechanisms and successfully load a modified firmware image while remaining unnoticed. In this paper we introduce BootKeeper, a static analysis approach...
We propose augmenting secure boot with a mechanism to protect against compromises to field-upgradeab...
A firmware encryption for embedded devices can prevent the firmware from being read out to clone the...
Security controls (such as encryption endpoints, payment gateways, and firewalls) rely on correct pr...
International audienceBoot firmware, like UEFI-compliant firmware, has been the target of numerous a...
Several techniques exist to verify the integrity of the software image to guarantee the absence of m...
The Internet of Things has a bootloader and applications responsible for initializing the device’s h...
As the number of so-called Internet-of-Things is continuously rising and the urge for regular hardwa...
Abstract—Embedded devices have become ubiquitous, and they are used in a range of privacy-sensitive ...
Runtime firmware product lines enable the generation of unified firmware images, i.e., a single firm...
User equipment (UE), such as smartphones, notebooks, laptops, and the like, require protection from ...
Trusted computing aims to build a trusted computing environment for information systems with the hel...
Bootkits are still the most powerful tool for attackers to stealthily infiltrate computer systems. I...
Abstract. How to build trusted firmware platform has been a research hot in computer security commun...
Abstract The design of a trusted system based on the Trusted Computing Group's Trusted Platform...
In recent times, the exponential surge in firmware demand and shorter Time-to-Market have underscore...
We propose augmenting secure boot with a mechanism to protect against compromises to field-upgradeab...
A firmware encryption for embedded devices can prevent the firmware from being read out to clone the...
Security controls (such as encryption endpoints, payment gateways, and firewalls) rely on correct pr...
International audienceBoot firmware, like UEFI-compliant firmware, has been the target of numerous a...
Several techniques exist to verify the integrity of the software image to guarantee the absence of m...
The Internet of Things has a bootloader and applications responsible for initializing the device’s h...
As the number of so-called Internet-of-Things is continuously rising and the urge for regular hardwa...
Abstract—Embedded devices have become ubiquitous, and they are used in a range of privacy-sensitive ...
Runtime firmware product lines enable the generation of unified firmware images, i.e., a single firm...
User equipment (UE), such as smartphones, notebooks, laptops, and the like, require protection from ...
Trusted computing aims to build a trusted computing environment for information systems with the hel...
Bootkits are still the most powerful tool for attackers to stealthily infiltrate computer systems. I...
Abstract. How to build trusted firmware platform has been a research hot in computer security commun...
Abstract The design of a trusted system based on the Trusted Computing Group's Trusted Platform...
In recent times, the exponential surge in firmware demand and shorter Time-to-Market have underscore...
We propose augmenting secure boot with a mechanism to protect against compromises to field-upgradeab...
A firmware encryption for embedded devices can prevent the firmware from being read out to clone the...
Security controls (such as encryption endpoints, payment gateways, and firewalls) rely on correct pr...