Table of Contents Author Guidelines Submit a Manuscript
Scientific Programming
Volume 2016, Article ID 4516596, 12 pages
http://dx.doi.org/10.1155/2016/4516596
Research Article

Research on Linux Trusted Boot Method Based on Reverse Integrity Verification

1School of Computer, National University of Defense Technology, Changsha, Hunan 410073, China
2College of Polytechnic, Hunan Normal University, Changsha, Hunan 410073, China
3Department of Computer and Information Engineering, Luoyang Institute of Science and Technology, Luoyang, Henan 471023, China

Received 25 February 2016; Accepted 8 May 2016

Academic Editor: Florin Pop

Copyright © 2016 Chenlin Huang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. Trusted Computing Group, Trusted Platform Module Specification [EB/OL], http://www.trustedcomputinggroup.org/developers/trusted_platform_module/specifications.
  2. China TCM Unit, http://www.ztcia.com.
  3. X. Zhang and C. Shen, “A novel design of trusted platform control module,” Geomatics and Information Science of Wuhan University, vol. 33, no. 10, pp. 1011–1014, 2008. View at Google Scholar · View at Scopus
  4. J.-E. Ekberg, K. Kostiainen, and N. Asokan, “Trusted execution environments on mobile devices,” in Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS '13), pp. 1497–1498, Berlin, Germany, November 2013. View at Publisher · View at Google Scholar · View at Scopus
  5. R. S. Sujeen and S. Periasami, “Verifying trusted code execution using ARM trustzone,” International Journal of Computer Science and Network Security, vol. 13, no. 10, pp. 41–46, 2013. View at Google Scholar
  6. T. Nyman, J. E. Ekberg, and N. Asokan, “Citizen electronic identities using TPM 2.0,” in Proceedings of the 4th International Workshop on Trustworthy Embedded Devices (TrustED '14), pp. 37–48, Scottsdale, Ariz, USA, November 2014. View at Publisher · View at Google Scholar
  7. S. Zhao, Q. Zhang, G. Hu, Y. Qin, and D. Feng, “Providing root of trust for ARM TrustZone using on-chip SRAM,” in Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, pp. 25–36, ACM, Scottsdale, Ariz, USA, November 2014. View at Publisher · View at Google Scholar
  8. N. Santos, K. P. Gummadi, and R. Rodrigues, “Towards trusted cloud computing,” in Proceedings of the Conference on Hot Topics in Cloud Computing (HotCloud '09), p. 3, June 2009.
  9. H. Banirostam, A. Hedayati, A. K. Zadeh, and E. Shamsinezhad, “A trust based approach for increasing security in cloud computing infrastructure,” in Proceedings of the 15th International Conference on Computer Modelling and Simulation (UKSim '13), pp. 717–721, IEEE, Cambridge, UK, April 2013. View at Publisher · View at Google Scholar · View at Scopus
  10. S. M. Habib, S. Ries, M. Mühlhäuser, and P. Varikkattu, “Towards a trust management system for cloud computing marketplaces: using CAIQ as a trust information source,” Security and Communication Networks, vol. 7, no. 11, pp. 2185–2200, 2014. View at Publisher · View at Google Scholar · View at Scopus
  11. T. Müller, H. Spath, R. Mäckl, and F. C. Freiling, “Stark,” in Financial Cryptography and Data Security, pp. 295–312, Springer, Berlin, Germany, 2013. View at Publisher · View at Google Scholar
  12. A. S. Kushwaha, “A trusted bootstrapping scheme using USB key based on UEFI,” International Journal of Computer and Communication Engineering, vol. 2, no. 5, pp. 543–546, 2013. View at Publisher · View at Google Scholar
  13. E. Brickell, J. Camenisch, and L. Chen, “Direct anonymous attestation,” in Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS '04), pp. 132–145, ACM, 2004. View at Publisher · View at Google Scholar
  14. D. Bernhard, G. Fuchsbauer, E. Ghadafi, N. P. Smart, and B. Warinschi, “Anonymous attestation with user-controlled linkability,” International Journal of Information Security, vol. 12, no. 3, pp. 219–249, 2013. View at Publisher · View at Google Scholar · View at Scopus
  15. L. Chen and J. Li, “Flexible and scalable digital signatures in TPM 2.0,” in Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS '13), pp. 37–48, November 2013. View at Publisher · View at Google Scholar · View at Scopus
  16. G. Proudler, L. Chen, and C. Dalton, “Direct Anonymous Attestation (DAA) in more depth,” in Trusted Computing Platforms, pp. 339–352, Springer International, Berlin, Germany, 2014. View at Google Scholar
  17. L. Yang, J. Ma, W. Lou, and Q. Jiang, “A delegation based cross trusted domain direct anonymous attestation scheme,” Computer Networks, vol. 81, pp. 245–257, 2015. View at Publisher · View at Google Scholar · View at Scopus
  18. B. Smyth, M. D. Ryan, and L. Chen, “Formal analysis of privacy in Direct Anonymous Attestation schemes,” Science of Computer Programming, vol. 111, no. 2, pp. 300–317, 2015. View at Publisher · View at Google Scholar · View at Scopus
  19. L. Chen, R. Landfermann, H. Löhr, M. Rohe, A.-R. Sadeghi, and C. Stüble, “A protocol for property-based attestation,” in Proceedings of the 1st ACM Workshop on Scalable Trusted Computing (STC '06), pp. 7–16, ACM, November 2006. View at Publisher · View at Google Scholar · View at Scopus
  20. L. Chen, H. Löhr, M. Manulis et al., “Property-based attestation without a trusted third party,” in Information Security, pp. 31–46, Springer, Berlin, Germany, 2008. View at Google Scholar
  21. J. Li, Y. Li, Y. Hu, H. Wang, and W. Liu, “An improved protocol for property-based attestation,” in Proceedings of the 32nd Chinese Control Conference (CCC '13), pp. 6343–6348, Xi'an, China, July 2013. View at Scopus
  22. V. Varadharajan and U. Tupakula, “Counteracting security attacks in virtual machines in the cloud using property based attestation,” Journal of Network and Computer Applications, vol. 40, no. 1, pp. 31–45, 2014. View at Publisher · View at Google Scholar · View at Scopus
  23. Y. Liang, K. E. Guo, and J. Li, “The remote attestation design based on the identity and attribute certificates,” in Proceedings of the 11th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP '14), pp. 325–330, Chengdu, China, December 2014. View at Publisher · View at Google Scholar
  24. X.-H. Yue and F. Zhou, “An efficient property-based attestation scheme with flexible revocation mechanisms,” in Proceedings of the IEEE 26th International Parallel and Distributed Processing Symposium Workshops & PhD Forum (IPDPSW '12), pp. 1223–1230, Shanghai, China, May 2012. View at Publisher · View at Google Scholar · View at Scopus
  25. S. Changxiang and Z. Yuelei, “Trusted connect architecture,” Chinese Standard GB/29828-2013, 2014. View at Google Scholar