A Secure and Reliable Bootstrap Architecture

نویسندگان

  • William A. Arbaugh
  • David J. Farber
  • Jonathan M. Smith
چکیده

In a computer system the integrity of lower layers is treated as axiomatic by higher layers Under the pre sumption that the hardware comprising the machine the lowest layer is valid integrity of a layer can be guaranteed if and only if the integrity of the lower layers is checked and transitions to higher layers occur only after integrity checks on them are complete The resulting integrity chain inductively guarantees system integrity When these conditions are not met as they typi cally are not in the bootstrapping initialization of a computer system no integrity guarantees can be made Yet these guarantees are increasingly impor tant to diverse applications such as Internet com merce intrusion detection systems and active net works In this paper we describe the AEGIS ar chitecture for initializing a computer system It val idates integrity at each layer transition in the boot strap process AEGIS also includes a recovery process for integrity check failures and we show how this re sults in robust systems We discuss our prototype implementation for the IBM personal computer PC architecture and show that the cost of such system protection is surprisingly small

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Automated Recovery in a Secure Bootstrap Process

Integrity is rarely a valid presupposition in much systems architecture, yet it is necessary to make any security guarantees. To address this problem, we have designed a secure bootstrap process, AEGIS, which presumes a minimal amount of integrity, and which we have prototyped on the Intel x86 architecture. The basic principle is sequencing the bootstrap process as a chain of progressively high...

متن کامل

Performance Implications of Securing Active Networks

Security is an obvious risk to active networking, as increased flexibility creates numerous opportunities for mischief. The point at which this flexibility is exposed, e.g., through the loading of code into network elements, must therefore be carefully crafted to ensure security. The Secure Active Network Environment (SANE) architecture provides a secure bootstrap process resulting in a module ...

متن کامل

Chaining Layered Integrity Checks

Chaining Layered Integrity Checks William A. Arbaugh Jonathan M. Smith \Dover y, no Prover y" “Trust, but Verify”1 In a system, the integrity of lower layers is typically treated as axiomatic by higher layers. Under the presumption that the hardware comprising the system (the lowest layer) is valid, the integrity of a layer can be guaranteed if and only if: (1) the integrity of the lower layers...

متن کامل

A Secure Active Network Environment Architecture Realization in SwitchWare

Active Networks is a network infrastructure which is programmable on a per-user or even per-packet basis. Increasing the flexibility of such network infrastructures invites new security risks. Coping with these security risks represents the most fundamental contribution of Active Network research. The security concerns can be divided into those which affect the network as a whole and those whic...

متن کامل

A Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment

With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...

متن کامل

Secure registration protocol for media appliances in wireless home networks

Wireless LANs based on the IEEE 802.11 technology are becoming increasingly prevalent. The availability of highbandwidth together with the convenience of being a wireless medium makes it a compelling technology for multimediabased applications. In this paper, we present a gatewaybased architecture of the wireless home media network and develop a secure registration protocol that is appropriate ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997