首页> 外文会议>IEEE International Conference on Computer and Communications >UEFI Trusted Computing Vulnerability Analysis Based on State Transition Graph
【24h】

UEFI Trusted Computing Vulnerability Analysis Based on State Transition Graph

机译:基于状态转换图的UEFI可信计算漏洞分析

获取原文

摘要

In the face of increasingly serious firmware attacks, it is of great significance to analyze the vulnerability security of UEFI. This paper first introduces the commonly used trusted authentication mechanisms of UEFI. Then, aiming at the loopholes in the process of UEFI trust verification in the startup phase, combined with the state transition diagram, PageRank algorithm and Bayesian network theory, the analysis model of UEFI trust verification startup vulnerability is constructed. And according to the example to verify the analysis. Through the verification and analysis of the data obtained, the vulnerable attack paths and key vulnerable nodes are found. Finally, according to the analysis results, security enhancement measures for UEFI are proposed.
机译:面对越来越严重的固件攻击,分析UEFI的脆弱性安全性具有重要意义。本文首先介绍了UEFI的常用可信认证机制。然后,针对启动阶段的UEFI信任验证过程中的漏洞,与状态转换图,PageRank算法和贝叶斯网络理论相结合,构建了UEFI信任验证启动漏洞的分析模型。并且根据示例来验证分析。通过验证和分析所获得的数据,找到了易受攻击的攻击路径和密钥弱势节点。最后,根据分析结果,提出了UEFI的安全增强措施。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号