GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Securing UEFI: An Underpinning Technology for Computing

  • Author(s):
  • Vijay S. Sarvepalli

The Chain of Trust model in the Unified Extensible Firmware Interface (UEFI) standard is designed to enable secure cryptographic verification of these components, establishing assurances that only trusted software is executed during the early boot cycle. But after the boot cycle is complete, UEFI still provides an interface to the operating system to enable configuration changes or software updates to the firmware.

Unlike the operating system, UEFI software remains invisible to most of us, despite its critical role in the functioning of a modern system. Because of its criticality and invisibility, vulnerabilities in UEFI-related software attract attackers and pose high risks to system security. This paper highlights the technical efforts to secure the UEFI-based firmware that serves as a foundational piece of modern computing environments.

  • Share on Facebook
  • Share on Twitter
  • Share via Email
  • Share on LinkedIn
Format:
  • White Paper
Topics:
Website:Visit Publisher Website
Publisher:Carnegie Mellon University Software Engineering Institute
Published:May 1, 2023
Copyright:© 2023 Carnegie Mellon University.

Featured Content

Contact Publisher

Claim Content