BootKeeper: Validating Software Integrity Properties on Boot Firmware Images
Conference on Data and Application Security and Privacy (CODASPY), Mar 2019, Dallas, United States. ACM Press, pp.11, Proceedings of the 9th ACM Conference on Data and Application Security and Privacy. http://www.codaspy.org/ Boot firmware, like UEFI-compliant firmware, has been the target of numero...
Gespeichert in:
Hauptverfasser: | , , , , , , , , |
---|---|
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Conference on Data and Application Security and Privacy (CODASPY),
Mar 2019, Dallas, United States. ACM Press, pp.11, Proceedings of the 9th ACM
Conference on Data and Application Security and Privacy.
http://www.codaspy.org/ Boot firmware, like UEFI-compliant firmware, has been the target of numerous
attacks, giving the attacker control over the entire system while being
undetected. The measured boot mechanism of a computer platform ensures its
integrity by using cryptographic measurements to detect such attacks. This is
typically performed by relying on a Trusted Platform Module (TPM). Recent work,
however, shows that vendors do not respect the specifications that have been
devised to ensure the integrity of the firmware's loading process. As a result,
attackers may bypass such measurement mechanisms and successfully load a
modified firmware image while remaining unnoticed. In this paper we introduce
BootKeeper, a static analysis approach verifying a set of key security
properties on boot firmware images before deployment, to ensure the integrity
of the measured boot process. We evaluate BootKeeper against several attacks on
common boot firmware implementations and demonstrate its applicability. |
---|---|
DOI: | 10.48550/arxiv.1903.12505 |