|
|
|
@ -152,12 +152,16 @@ Since TCG published its documents, several IT security teams investigated concep |
|
|
|
\label{fig:daa-attestation} |
|
|
|
\end{figure} |
|
|
|
|
|
|
|
\section{Trusted Boot} |
|
|
|
A boot process of modern platforms consists of several steps until the Operating System is loaded and controls the platform. |
|
|
|
First, the EFI firmware initializes the platform hardware and |
|
|
|
|
|
|
|
\section{Integrity Measurements} |
|
|
|
Extend the Chain of Trust beyond the boot process. |
|
|
|
The Kernel can measure many different types of Resources. |
|
|
|
What is a useful set of measurements |
|
|
|
|
|
|
|
\section{Verify Trust (DA and DAA)} |
|
|
|
\section{Verify Trust with DAA} |
|
|
|
|
|
|
|
\subsection{Definitions} |
|
|
|
For the definition of the algorithm, some notations and definitions are summarized in the following. |
|
|
|
|