3Building Chain of Trust
Corrupting critical components of computer systems, tampering system running codes and modifying configuration files of computer systems have become the most popular attack methods used by hackers. These attacks change original trusted execution environment (TEE) of systems via modifying running code and critical configuration files, and then use this untrusted execution environment to launch attacks. So building TEEs for computer systems is a critical security problem in current computer security area.
To build a trusted execution environment, we first need to clarify the definition of trust. There are many different definitions for trust in trusted computing. The international standard ISO/IEC [95] defines trust as ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access