Research on Key Technologies of Trusted Enhancement in Embedded Systems
- DOI
- 10.2991/cecs-18.2018.64How to use a DOI?
- Keywords
- Embedded system; trusted enhancement; trusted computing; chain of trust.
- Abstract
Aiming at the threats faced by embedded systems, using trusted computing technology to solve embedded security equipment problems is a feasible and efficient security solution. Under the premise of not changing the existing mobile device hardware architecture, a new secure boot mechanism of the embedded system is proposed, and the SD card is used as an external trusted platform module. Construct a complete trust chain from the Boot loader to the upper application. The starting point of the trust chain is stored in the SD card. The metric value of each component in the startup process is stored by the key signature in the SD card. And the implementation process of the mechanism is described, and its security is analyzed.
- Copyright
- © 2018, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Xinlai Dang AU - Fei Wang AU - Jie Qiang PY - 2018/07 DA - 2018/07 TI - Research on Key Technologies of Trusted Enhancement in Embedded Systems BT - Proceedings of the 2018 International Symposium on Communication Engineering & Computer Science (CECS 2018) PB - Atlantis Press SP - 372 EP - 377 SN - 2352-538X UR - https://doi.org/10.2991/cecs-18.2018.64 DO - 10.2991/cecs-18.2018.64 ID - Dang2018/07 ER -