{"title":"Secure boot of Embedded Applications - A Review","authors":"R. Rashmi, A. Karthikeyan","doi":"10.1109/ICECA.2018.8474730","DOIUrl":null,"url":null,"abstract":"Trusted Computing focusses on the security of systems by using hardware-software combination to guarantee security. Although there are various techniques to enhance security, new technological advancements bring in new ways for attackers also to inject their malicious software and infections. The modern world uses all smart devices and systems which includes a network with embedded Operating System, sensors and so on. So security becomes a serious issue not only to system Operating System in personal computers but to all these smart devices. Secure boot is a technique which ensures the only the right Operating System gets booted. This paper analyses the process of secure boot done in each of the applications to protect OS kernel from attackers.","PeriodicalId":272623,"journal":{"name":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECA.2018.8474730","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
Trusted Computing focusses on the security of systems by using hardware-software combination to guarantee security. Although there are various techniques to enhance security, new technological advancements bring in new ways for attackers also to inject their malicious software and infections. The modern world uses all smart devices and systems which includes a network with embedded Operating System, sensors and so on. So security becomes a serious issue not only to system Operating System in personal computers but to all these smart devices. Secure boot is a technique which ensures the only the right Operating System gets booted. This paper analyses the process of secure boot done in each of the applications to protect OS kernel from attackers.