Browse > Article
http://dx.doi.org/10.7471/ikeee.2012.16.4.389

Software-based Encryption Pattern Bootstrap for Secure Execution Environment  

Choi, Hwa-Soon (Dept. of Computer Engineering, Hanbat University)
Lee, Jae-Heung (Dept. of Computer Engineering, Hanbat University)
Publication Information
Journal of IKEEE / v.16, no.4, 2012 , pp. 389-394 More about this Journal
Abstract
Most current systems have ignored security vulnerability concerned with boot firmware. It is highly likely that boot firmware may cause serious system errors, such as hardware manipulations by malicious programs or code, the operating system corruption caused by malicious code and software piracy under a condition of no consideration of security mechanism because boot firmware has an authority over external devices as well as hardware controls. This paper proposed a structural security mechanism based on software equipped with encrypted bootstrap patterns different from pre-existing bootstrap methods in terms of securely loading an operating system, searching for malicious codes and preventing software piracy so as to provide reliability of boot firmware. Moreover, through experiments, it proved its superiority in detection capability and overhead ranging between 1.5 % ~ 3 % lower than other software security mechanisms.
Keywords
secure boot; embedded security; secure bootstrap; secure execution environment;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Trusted Computing Group, "TCG TPM Specification, Version 1.2, Revision 103," https://www.trustedcomputinggroup.org/specs/TPM, 2007.
2 W. A. Arbaugh, D. J. Farber, and J. M. Smith, "A Secure and Reliable Bootstrap Architecture," in IEEE Symposium on Security and Privacy. IEEE, 1997, pp. 65-1.
3 K. Shimizu, "The Cell Broadband Engine Processor Security Architecture," http://www.ibm.com/developerworks/power/library/ pa-cellsecurity/, Apr. 2006.
4 Paul Kocher, Ruby Lee, Gary McGraw, Anand Raghunathan and Srivaths Ravi, "Security as a New Dimension in Embedded System Design", ACM, pp. 753-760, June 2004.
5 S. Rabi, A. Raghunathan, and S. Chakradhar. "Temper Resistance Mechanisms for Secure Embedded Systems", in Proc. int. Conf. ,Jan. 2004.
6 Eric James Lorden. "A Secure Software Platform for Real-Time Embedded Systems", Bradley Department of Electrical and Computer Engineering Blacksburg, Virginia December 15, 2006
7 Vulnerability notes database, CERT coordinationcenter: http://www.kb.cert.org/vuls/, 2006.
8 Black, Paul E. F, "Fisher-Yates shuffle", Dictionary of Algorithms and Data Structures, National Institute of Standards and Technology, Retrieved 2007-08-09.
9 Vladimir Kiriansky, Derek Bruening, Saman Amarasinghe. "Secure Execution Via Program Shepherding." MIT Press, 2002, pp. 191-206.
10 E. Naess, D. A. Frincke, A. D. McKinnon, and D. E. Bakken, "Configurable middlewarelevel intrusion detection for embedded systems," International Workshop on Security in Distributed Computing Systems, vol. 02, pp. 144-151, 2005