The Chain of Trust model in the Unified Extensible Firmware Interface (UEFI) standard is designed to enable secure cryptographic verification of these components, establishing assurances that only trusted software is executed during the early boot cycle. But after the boot cycle is complete, UEFI still provides an interface to the operating system to enable configuration changes or software updates to the firmware.
Unlike the operating system, UEFI software remains invisible to most of us, despite its critical role in the functioning of a modern system. Because of its criticality and invisibility, vulnerabilities in UEFI-related software attract attackers and pose high risks to system security. This paper highlights the technical efforts to secure the UEFI-based firmware that serves as a foundational piece of modern computing environments.
Format: |
|
Topics: | |
Website: | Visit Publisher Website |
Publisher: | Carnegie Mellon University Software Engineering Institute |
Published: | May 1, 2023 |
Copyright: | © 2023 Carnegie Mellon University. |