Analysis on Development Methodology of Modern Secure boot: Focusing on Platform Environment
![]() |
Kim, Jin-Woo
(충남대학교 컴퓨터공학과)
Lee, Sang-Gil (충남대학교 컴퓨터공학과) Lee, Jeong-Guk (충남대학교 컴퓨터공학과) Lee, Sang-Han (ETRI부설연구소) Shin, Dong-Woo (ETRI부설연구소) Lee, Cheol-Hoon (충남대학교 컴퓨터공학과) |
1 | A. Matrosov, Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats, No Starch Press, 2019. |
2 | M. Sabt, M. Achemlal, and A. Bouabdallah, "Trusted Execution Environment: What It is, and What It is Not," 2015 IEEE Trustcom/BigDataSE/ISPA, pp.57-64, 2015. |
3 | G. Bowen and W. Ozuem, Computer-Mediated Marketing Strategies: Social Media and Online Brand Communities, IGI Global, 2014. |
4 | J. P. John, A. Moshchuk, S. D. Gribble, and A. Krishnamurthy, "Studying spamming botnets using Botlab," Proceedings of the 6th USENIX symposium on Networked systems design and implementation, pp.291-306, 2009. |
5 | https://www.microsoft.com/security/blog/2017/06/27/new-ransomware-old-techniques-petya-adds-worm-capabilities/ |
6 | C. Wressnegger, F. Yamaguchi, D. Arp, and K. Rieck, "Comprehensive Analysis and Detection of Flash-Based Malware," Proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pp.101-121, 2016. |
7 | https://encyclopedia.kaspersky.com/glossary/bootkit/ |
8 | https://encyclopedia.kaspersky.com/glossary/rootkit/ |
9 | W. A. Arbaugh, D. J. Farber, and J. M. Smith, "A secure and reliable bootstrap architecture," Proceedings, 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097), pp.65-71, 1997. |
10 | UEFI, Unified Extensible Firmware Interface Specification Version 2.3.1 Errata C, UEFI Forum, 2012. |
11 | https://techcommunity.microsoft.com/t5/Windows-Hardware-Certification/Microsoft-UEFICA-Signing-policy-updates/ba-p/364828 |
12 | https://www.welivesecurity.com/2018/09/27/lojax-first-uefi-rootkit-found-wild-courtesy-sednit-group/ |
13 | V. Bashun, A. Sergeev, V. Minchenkov, and A. Yakovlev, "Too young to be secure: Analysis of UEFI threats and vulnerabilities," 2013 14th Conference of Open Innovations Association, pp.16-24, 2013. |
14 | https://docs.microsoft.com/ko-kr/windows-hardware/drivers/install/early-launch-antimalware |
15 | https://docs.microsoft.com/ko-kr/windows-hardware/drivers/install/elam-driver-requirements |
16 | https://docs.microsoft.com/ko-kr/windows/security/threat-protection/intelligence/virus-initiative-criteria |
17 | Apple, Apple T2 Security Chip, Apple Inc., 2018. |
18 | https://www.slashgear.com/apple-t2-chip-confirmed-to-have-kill-switch-for-diy-repairs-12553488/ |
19 | https://appleinsider.com/articles/19/04/09/apples-t2-chip-makes-a-giant-difference-in-video-encoding-for-most-users |
20 | https://en.wikipedia.org/wiki/GNU_GRUB |
21 | https://docs.fedoraproject.org/en-US/Fedora/18/html/UEFI_Secure_Boot_Guide/sect-UEFI_Secure_Boot_Guide-Implementation_of_UEFI_Secure_Boot-Shim.html |
22 | Apple, iOS Security: iOS 12.3, Apple Inc., 2019. |
23 | https://source.android.com/security/verifiedboot |
24 | ARM, ARM Security Technology: Building a Secure System using Trustzone(R) Technology, ARM Limited., 2009. |
25 | https://lwn.net/Articles/447381/ |
26 | https://www.wired.com/story/ios-jailbreak-new/ |
27 | https://source.android.com/devices/architecture |
28 | Xilinx, Zynq-7000 SoC Technical Reference Manual, Xilinx, 2018. |
29 | Samsung Research America, Whitepaper: Samsung Knox Security Solution, Samsung Electronics, 2017. |
30 | https://android-developers.googleblog.com/2014/07/knox-contribution-to-android.html |
31 | E. Peterson, Secure Boot of Zynq-7000 SoC(XAPP1175), Xilinx, 2019. |
32 | https://github.com/Project-Olympus |
33 | B. Kelly, Project Cerberus Security Architecture Overview Specification, Open Compute Project, 2017. |
34 | 고재용, 이상길, 김진우, 이철훈, "IoT 보안 요구사항 및 보안 운영체제 기반 기술 분석," 한국콘텐츠학회논문지, 제18권, 제4호, pp.164-177, 2018. DOI |
35 | https://news.joins.com/article/23472884 |
![]() |