Acknowledgement
Supported by : 한국연구재단
References
- Lorenzo Franceschi-Bicchierai, "Hack Into a Linux Computer by Hitting the Backspace 28 Times," Motherboard, Dec. 17, 2015, [Online]. Available: http://motherboard.vice.com/read/hack-into-a-linux-computer-by-hitting-the-backspace-28-times.
- Marco Gisbert, H., "CVE-2015-8370-Grub2 0<=2.02, Back to 28: Authentication Bypass," 2015.
- Proudler, Graeme, Liqun Chen, and Chris Dalton, "Trusted Computing Platforms: TPM2. 0 in Context," Springer, 2015.
- George Bricker, "Unified extensible firmware interface (UEFI) and Secure boot: promise and pit falls," Journal of Computing Science Collection, 29, 1 pp. 60-63, Oct. 2013.
- Y. Bulygin, A. Furtak, and O. Bzahaniuk, "A Tale of One Software Bypass of Windows 8 Secure Boot," BlackHat, 2013.
- Vladimir Bashun, Anton Sergeev, Virtor Minchenk ov, Alexandr Yakovlev, "Too young to be Secure: Analysis of UEFI Threats and Vulnerabilities," St. Petersburg State University of Aerospace Instrume ntation, St. Petersburg, Russia, 2014.
- Pierluigi Paganini, "A new way to bypass Secure Boot security mechanism of UEFI," Security Affairs, June, 2014, [Online]. Available: http://securityaffairs.co/wordpress/25425/hacking/bypass-secure-boot-uefi.html.
- Bernhard Kauer, "OSLO: Improving the security of Trusted Computing," 16th USENIX Security Symposium, 2007, pp. 229-237.
- Johannes Gotzfried and Tilo Muller, "Mutual Authentication and Trust Bootstrapping towards Secure Disk Encryption," ACM Trans. Inf. Syst. Secur., Vol. 17, No. 2, Article 6, p. 23, Nov. 2014.
- Daniel Neus, "Trusted GRUB2," Rohde Schwarz Cyber security, Oct. 2016, [Online]. Available: https://github.com/RohdeSchwarz-Cybersecurity/TrustedGRUB2.