3Building Chain of Trust
Corrupting critical components of computer systems, tampering system running codes and modifying configuration files of computer systems have become the most popular attack methods used by hackers. These attacks change original trusted execution environment (TEE) of systems via modifying running code and critical configuration files, and then use this untrusted execution environment to launch attacks. So building TEEs for computer systems is a critical security problem in current computer security area.
To build a trusted execution environment, we first need to clarify the definition of trust. There are many different definitions for trust in trusted computing. The international standard ISO/IEC [95] defines trust as ...
Get Trusted Computing now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.