diff --git a/thesis/02_concept.tex b/thesis/02_concept.tex index 977853f..3cded3d 100644 --- a/thesis/02_concept.tex +++ b/thesis/02_concept.tex @@ -152,12 +152,16 @@ Since TCG published its documents, several IT security teams investigated concep \label{fig:daa-attestation} \end{figure} +\section{Trusted Boot} +A boot process of modern platforms consists of several steps until the Operating System is loaded and controls the platform. +First, the EFI firmware initializes the platform hardware and + \section{Integrity Measurements} Extend the Chain of Trust beyond the boot process. The Kernel can measure many different types of Resources. What is a useful set of measurements -\section{Verify Trust (DA and DAA)} +\section{Verify Trust with DAA} \subsection{Definitions} For the definition of the algorithm, some notations and definitions are summarized in the following. diff --git a/thesis/MAIN.pdf b/thesis/MAIN.pdf index 429683d..1583c75 100644 Binary files a/thesis/MAIN.pdf and b/thesis/MAIN.pdf differ diff --git a/thesis/literature.bib b/thesis/literature.bib index 37df685..de1a652 100644 --- a/thesis/literature.bib +++ b/thesis/literature.bib @@ -134,6 +134,15 @@ urldate = {2020-02-27} } +@online{tevora-secureboot, + author = {Tevora}, + year = {2019}, + month = {06}, + title = {Configuring Secure Boot + TPM 2}, + url = {https://threat.tevora.com/secure-boot-tpm-2/}, + urldate = {2020-06-19} +} + @online{pornkitprasan19-secureboot, author = {Pawit Pornkitprasan}, year = {2019},