WO2009108371A1 - A computer system comprising a secure boot mechanism - Google Patents

A computer system comprising a secure boot mechanism Download PDF

Info

Publication number
WO2009108371A1
WO2009108371A1 PCT/US2009/001289 US2009001289W WO2009108371A1 WO 2009108371 A1 WO2009108371 A1 WO 2009108371A1 US 2009001289 W US2009001289 W US 2009001289W WO 2009108371 A1 WO2009108371 A1 WO 2009108371A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
boot
memory
volatile memory
instructions
Prior art date
Application number
PCT/US2009/001289
Other languages
French (fr)
Inventor
Ralf Findeisen
Michael Grell
Tim Edward Perley
Marc Edwin Jones
Frank Schuecke
Original Assignee
Advanced Micro Devices, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Advanced Micro Devices, Inc. filed Critical Advanced Micro Devices, Inc.
Priority to JP2010548742A priority Critical patent/JP2011527777A/en
Priority to KR1020107021808A priority patent/KR101237527B1/en
Priority to EP09716112A priority patent/EP2250599A1/en
Priority to CN200980106728XA priority patent/CN101965570B/en
Publication of WO2009108371A1 publication Critical patent/WO2009108371A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/72Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits

Definitions

  • the present disclosure generally relates to the field of computer systems of enhanced integrity and corresponding mechanisms implemented therein, which may enable the provision of enhanced security standards, thereby enhancing efficiency of applications requiring a secure computer platform.
  • significant damage may be created in private environments, and in particular in the industry, by introducing software applications which may, for instance, manipulate software files such as stored data, communicate information via the internet without knowledge of the actual user of the platform, start a denial of service attack, thereby possibly rendering the platform to be no longer usable for a dedicated application requiring a specific status of the platform.
  • software applications which may, for instance, manipulate software files such as stored data, communicate information via the internet without knowledge of the actual user of the platform, start a denial of service attack, thereby possibly rendering the platform to be no longer usable for a dedicated application requiring a specific status of the platform.
  • a plurality of encryption techniques are available, such as symmetric or asymmetric encryption/decryption techniques which enable the exchange of data with a high degree of resistance against tampering data by a third party during the transmission and storage of data.
  • a pair of a private key and a public key may be used for encrypting data by means of one of the keys and deciphering the data by using the other key, wherein one of the keys may be publicly accessible.
  • these techniques may provide enhanced integrity in data communication and data storage, the actual configuration of a computer platform under consideration may still provide the possibility of a plurality of attacks, in particular, as many applications intended for increasing computer security may rely on a trusted platform configuration.
  • a trusted computer platform may be considered as a computer system in which the hardware configuration as well as the software applications may be assumed to be in a dedicated configuration.
  • a secure platform configuration may be established only by establishing a "chain" of trusted platform levels, wherein each subsequent level may be initialized by the preceding level only, if the integrity of the subsequent level has been verified.
  • the integrity at system level may be preserved through a chain of integrity verifications wherein a root of the chain of verification steps may have to be provided with a high degree of tamper resistance so as to also accomplish a high confidence with respect to integrity of the system after initializing the highest level, i.e., the level of user applications.
  • the initialization of the system requires various degrees of abstraction, for example with respect to initializing the central processing unit (CPU), initializing the system memory, which is typically provided externally to the CPU, loading an operating system into the system memory from an external mass storage device, and finally executing user applications.
  • CPU central processing unit
  • system memory which is typically provided externally to the CPU
  • loading an operating system into the system memory from an external mass storage device and finally executing user applications.
  • the various system activities prior to loading the operating system can be considered to be secure so as to rely on the integrity of the operating system and the user application, since the operating system may be invoked by a "mistrusted" process, thereby providing the opportunity of manipulating the basic platform configuration by modifying hardware and software components.
  • boot strapping the process of initializing the various hardware components of the computer system, such as the system memory and the execution of the instructions contained therein for initializing the higher system levels, which may also be referred to as boot strapping or booting, may have to be incorporated into the chain of trust to provide enhanced overall system integrity.
  • a typical start sequence for initializing a computer system after applying power or after a reset event causes a "power on self-test" of the CPU, wherein also the processor starts execution of instructions at a dedicated entry address that is indicated by the processor's reset vector.
  • BIOS basic input/output system
  • BIOS basic input/output system
  • the remaining self-test may be performed and the hardware configuration of the platform may be determined or "measured.”
  • a search for a bootable device may be performed, such as a mass storage device, for instance the hard disk of the computer system, a disk, a CD-ROM, an extension card and the like, from which a primary boot block may be loaded into the system memory, wherein control is then passed to the primary boot block, which may load an operating system into the system memory.
  • the present disclosure is directed to various devices and methods that may avoid, or at least reduce, the effects of one or more of the problems identified above.
  • the present disclosure relates to devices and mechanisms for enhancing integrity of computer systems by establishing a static root of trust for measurement in that a certain set of data is provided that may include executable instructions and data values, which may be accessed by the microprocessor at start up in any case without providing the possibility of circumventing access to the dedicated data set so that a defined root for the initialization of the platform is obtained.
  • the set of data is implemented in such a manner that a high level of resistance against any attacks for manipulation may be achieved.
  • the corresponding routine may not be changed or interrupted, thereby providing a high degree of integrity of this set of data, which may thus be considered as a pre-boot set of instructions and data values.
  • a chain of trusted software may be started, thereby enabling establishment of a high degree of system integrity, since the dedicated set of pre- boot data represents the static core root for the chain of subsequent verification steps.
  • the pre-boot data set may be maintained in a non-volatile memory in the CPU core itself, thereby substantially avoiding any attacks with respect to replacing BIOS chips and the like.
  • One illustrative method disclosed herein relates to starting a computer system.
  • the method comprises accessing a first set of data stored in a non-volatile memory area of a central processing unit (CPU), wherein the first set of data includes first instructions causing a core circuit of the CPU to initialize a random access memory of the CPU.
  • the method further comprises loading an image of a second set of data from a non-volatile memory into the initialized random access memory, wherein the second set of data comprises a signature for verifying integrity of the second set of data and further comprises second instructions that cause the CPU to initialize a system memory of the computer system.
  • the method comprises verifying the integrity of the second set of data by using the signature and a decryption key included in the first set of data.
  • the method comprises initializing the system memory using the second instructions when verification of the second set of data has been successful.
  • a further illustrative method disclosed herein relates to starting a computer system and comprises, upon at least one of a power-up event and a reset event, accessing an internal non- volatile memory of a CPU.
  • the non-volatile memory contains pre-boot instructions and data values for initializing an internal random access memory of the CPU and for verifying an integrity of at least a portion of boot instructions and boot data values stored in a non- volatile memory of the computer system.
  • the method further comprises loading the portion of the boot instructions and boot data values from the non- volatile memory into the internal random access memory by executing the pre-boot instructions.
  • integrity of at least a portion of the boot instructions and boot data values is verified by executing the pre- boot instructions.
  • the method comprises, after successfully verifying integrity of the at least a portion of the boot instructions and boot data values, executing the boot instructions.
  • One illustrative central processing unit (CPU) disclosed herein comprises a substrate having formed thereon circuit elements defining a CPU core, a random access memory, a non-volatile memory and a bus system for connecting the CPU core, the random access memory and the non-volatile memory. Furthermore, the CPU comprises pre-boot information stored in the non-volatile memory, wherein the pre-boot information includes instructions executable by the CPU core and also comprises data values for initializing the volatile random access memory and verifying at least a portion of a boot routine to be supplied from an external memory device.
  • the central processing unit described above may be a part of a computer system comprising, in addition to the CPU, a system memory, a memory device containing the boot routine and an interface system for connecting the system memory and the memory device including the boot routine with the CPU.
  • FIG. 1 schematically illustrates a central processing unit (CPU) including a random access memory (cache), a CPU core and a non-volatile memory including pre-boot information, according to illustrative embodiments;
  • CPU central processing unit
  • cache random access memory
  • non-volatile memory including pre-boot information
  • Figure Ib schematically illustrates a computer system including a CPU including internal pre-boot information, according to other illustrative embodiments;
  • Figure Ic schematically illustrates process steps for manipulating bootstrap data including instructions and data values during a process for creating a signature of a first portion of the boot information, according to illustrative embodiments;
  • Figure Id schematically illustrates a process for verifying a signature of a portion of the boot information, according to illustrative embodiments
  • Figure 1 e illustrates a flow diagram for describing operation of the computer system as shown in Figure Ib, according to one illustrative embodiment
  • FIG. If illustrates a flow diagram describing operation of a computer system including a CPU, such as the CPU of Figure Ia, according to still other illustrative embodiments.
  • the present disclosure provides a system and a mechanism for executing, at start up or reset or any other operational state requiring an initialization of the system, instructions and using data stored in a non-volatile memory representing a part of a central processing unit, thereby significantly reducing the possibility of manipulating the set of data included in the non- volatile memory. Consequently, the contents of the non- volatile memory may be used as a static root of trust for measurement during the initialization of the CPU and the entire computer system by ensuring that, upon power-up or reset of the CPU, the first instruction is fetched from the non-volatile memory.
  • the set of data contained therein may serve as a pre-boot or pre-BIOS component which may enable the initialization of further system components, such as an internal random access memory, which may be used for storing operational data like variables and stack and instructions for running a portion of BIOS software.
  • the data cache as part of the random access memory area and an instruction cache may be initialized by the pre-boot data of the internal non-volatile memory, thereby substantially avoiding the possibility of external access to data contained therein during the initialization process. That is, the random access memory area, i.e., the data cache and the instruction cache, are CPU-internal components and unwanted manipulation may be very difficult, in particular as the external system memory is not initialized at this stage.
  • the BIOS routine may be divided into two or more portions such that verification of one or more signatures in view of BIOS integrity may be performed in the random access memory for the first portion that is configured to have a size so as to fit into the instruction cache.
  • this portion of the boot information may, after verifying the integrity thereof, be executed directly from the random access memory. Consequently, during initialization of the random access memory and loading the portion of the boot information by executing the pre-boot instructions, the pre-boot information may not be accessed externally, thereby substantially avoiding any manipulation of the first signature verification process.
  • the pre-boot information may be accessed after signature verification by an external application, for instance for accessing decryption keys for evaluating the integrity of BIOS upgrade versions and the like.
  • the data i.e., the instructions and data values, contained in the non- volatile memory provided as an integral part of the CPU may be used as a static core root of trust for measurement, thereby providing a computer platform in which a tamper-resistant hardware and software configuration may be achieved.
  • the mechanism of embodiments disclosed herein may provide enhanced security for typical practical applications which use the platform in the context of financial transactions or digital rights management, which may be based on the requirement of a trustworthy computer platform.
  • FIG. Ia schematically illustrates a central processing unit (CPU) 100 according to illustrative embodiments in which a core root of trust for measurement (CRTM) is implemented with a high degree of tamper resistance.
  • the CPU 100 may comprise a CPU core 102 which may include components for data processing, such as performing arithmetic operations, logic operations and the like.
  • the CPU core 102 is functionally connected to a random access memory 101 which may comprise a plurality of static RAM cells and the like, as is compatible with the overall configuration of the CPU 100.
  • the RAM 101 may comprise a first memory portion, also indicated as data cache 101 A, and a second portion indicated as instruction cache 101 B.
  • the RAM 101 may be implemented in a fast memory technology to enhance the overall performance of the CPU 100, as is typically required in sophisticated integrated circuits. It should be appreciated, however, that any appropriate memory technology may be used for the memory 101 as long as direct control of the memory 101 via the CPU core 102 may be accomplished without the possibility of external access during initialization of the CPU 100.
  • the CPU 100 may comprise a non- volatile memory 103, which may be provided in any appropriate memory technology, for instance in the form of a flash memory or any other read-only memory technique, which may not enable external access for modifying the contents of the memory 103.
  • the memory 103 may be considered as a secure memory area, the contents of which may therefore represent a static root of trust.
  • a set of data 103 A which is to be understood as instructions executable by the CPU core 102 and data values representing operands and the like of the instructions, is provided, at least in a portion of the memory 103, which may not be overwritten with new data once the respective portion of the memory 103 is programmed.
  • the memory 103 containing the set of data 103 A may be connected to the CPU core 102 by means of a bus system 104 such that, upon power-up or reset, a jump to a specified address of the memory 103 is performed. Consequently, a "hard- wired" target for a reset vector of the CPU core 102 may be provided which ensures that execution of instructions may start from the secure memory 103, at least for a power-up event and a reset event.
  • the CPU 100 may be formed on the basis of sophisticated semiconductor manufacturing techniques in which an appropriate carrier material, such as a semiconductor substrate and the like, may receive a plurality of circuit elements formed on the basis of a technology under consideration, such as CMOS processes and the like, in which transistor elements, capacitors, resistors and the like may be formed in accordance with a specific device architecture for the CPU 100.
  • the various components of the CPU 100 may therefore be formed on a common substrate during a common manufacturing process flow, thereby providing the memories 101 and 103 as internal or integral components of the device 100.
  • respective manufacturing techniques are well established in which volatile and fast memory cells may be formed together with non-volatile memory cells and high performance logic gates as may be required in the CPU core 102.
  • FIG. Ib schematically illustrates a computer system 150 comprising the CPU 100 providing the protected environment for the set of data 103 A, as previously explained, wherein, in the embodiment shown, the CPU 100 may comprise the random access memory 101 in the form of the data cache 101 A and the instruction cache 101 B, which may have a size of, for example, 64 kB so as to accommodate a portion of boot information and to act as a "system RAM" when performing instructions of the data set 103 A.
  • the instruction cache 101 B may be provided with a size of 64 kB, wherein it should be appreciated that any other appropriate memory size may be used that is compatible with the size of a respective portion of boot information that is to be performed from the memory 101 during a verification process.
  • the internal non- volatile memory 103 may be provided with any appropriate size, for instance 32k, so as to be compatible with the requirements for the data 103 A representing the core root of trust for measurement for the computer system 150.
  • the set of data 103 A may comprise instructions and data values representing a secure load routine for loading a respective portion of boot information into the internal memory 101 for performing a verification process.
  • the set of data 103 A may comprise one or more decryption keys which may represent public keys of an asymmetric encryption/decryption algorithm so as to enable a signed portion of the boot information to be verified within the memory 101. It should be appreciated that the number of public keys in the data set 103 A may be selected in accordance with safety considerations, for instance in view of maintaining an appropriate infrastructure for providing respective key pairs with a high degree of integrity and the like.
  • the computer system 150 may further comprise a system memory 1 10, for instance in the form of any appropriate memory device including random access memory cells, such as dynamic RAM cells and the like.
  • the size of the system memory 110 may be adapted to the requirements of the system 150 in view of performance and storage capacity.
  • the system 150 may comprise a non- volatile memory 120, such as a flash memory and the like, which may include information, also referred to as BIOS information, at least a portion of which may be a signed portion, that is, the signed portion may comprise a signature obtained on the basis of an appropriate hash algorithm in combination with an encryption mechanism, for which one or more appropriate decryption keys may be contained in the set of data 103 A, as previously explained.
  • the non- volatile memory 120 may contain the boot information that is divided into two portions, wherein a first portion may comprise data and instructions for initializing other system components, such as the system memory 110, for accommodating the second portion of boot information and executing the second portion once the first portion has been verified on the basis of the protected environment provided by the CPU 100.
  • a first portion may comprise data and instructions for initializing other system components, such as the system memory 110, for accommodating the second portion of boot information and executing the second portion once the first portion has been verified on the basis of the protected environment provided by the CPU 100.
  • the computer system 150 may further comprise an interface system 140 configured to operatively connect the system memory 1 10 and the non- volatile memory 120 with the CPU 100.
  • the system 150 may further comprise a one-time programmable memory 130, which may include platform-specific information, for instance about boot sources and related parameters.
  • the one-time programmable memory 130 may comprise information concerning boot options in order to indicate to the CPU 100 whether to boot from the internal memory 103 or not.
  • security bits provided in the memory 130 may include a respective bit that determines where the initial instruction fetch of the CPU 100 after reset is rooted to. For example, with this bit set to "1," execution may be passed to the internal memory 103, thereby enabling secure boot processing.
  • the secure boot functionality may be desirable for development/debug purposes. In other cases, depending on platform requirements, it may also be desirable to disable or bypass trusted platform security features. In this case, a change of the state of this bit may not be allowable during the secure boot processing. For this purpose, all debug modes (JTAG, ...) are disabled at least during the boot time. After disabling respective debug modes, execution of the secure boot process may be performed, as will be described later on in more detail. Similarly, the memory 130 may include a bit for controlling debug features during the secure boot process, which may be advantageous during development periods, while, for production, a respective control of debug features is to be disabled.
  • the memory 130 may comprise other information, such as the vendor identification or any unique number which may be usable for digital rights management applications and the like. It should be appreciated that, in other illustrative embodiments, the one-time programmable memory 130 may be omitted or may be provided so as to include other information controlling the secure boot processing during development and actual application.
  • Figure Ic schematically illustrates the configuration of boot information 121 that may be stored in the non- volatile memory 120.
  • the boot information 121 which may also be referred to as BIOS, may comprise a first portion 121 A, which may represent a set of data including instructions and data values having a size so as to be compatible with the size of the memory 101, as previously explained.
  • a maximum size of the portion 121 A may be restricted to approximately 32 kB. It should be appreciated, however, that any other appropriate size of the portion 121 A may be applied, depending on the available amount of storage within the RAM 101. It should further be appreciated that providing the portion 121 A may be necessary for boot information 121 which exceeds the size of the memory 101 so that the entire boot processing may not be performed on the basis of the memory 101 since typical boot routines may have a size of several hundred kByte and more. In other cases, when sufficient storage space may be available, the boot information 121 as a whole may be used during the secure boot processing, as will be discussed later on in more detail.
  • the portion 12 IA may serve as an initial BIOS "loader" for a second portion 121B, wherein the first portion 121 A may contain therein a hash value obtained over the portion 121 B.
  • the hash value for the portion 121B may also be protected by the signature contained in the portion 121 A on the basis of a hash value obtained over the first portion 12 IA, which may be accomplished in a dedicated trust center. Thus, encryption of the hash value of the second portion may not be necessary.
  • the signature of the hash value(s) for the portion 121 A may be used for verifying the portion 12 IA during a secure boot processing.
  • the portion 121 A may therefore be configured to perform necessary platform initialization actions, such as initialization of a memory controller and the like, followed by shadowing the portion 12 IB from the memory 120 into the initialized system memory 110.
  • a hash value may also be calculated over the image 121B copied into the system memory 110, which may then be compared with the hash value initially contained in the portion 121 A.
  • integrity of the portion 12 IB may be verified on the basis of the hash value contained in the portion 121 A, thereby providing a trusted chain of integrity. Consequently, as shown in Figure Ic, the portion 121 A may be processed so as to obtain a signature, which may be accomplished in an appropriate trust center on the basis of an appropriate trustworthy environment.
  • secure hash algorithms may be applied to provide one or more hash values, for instance indicated as hash 0, hash 1, hash 2 in combination with appropriate control data.
  • any appropriate encryption technique may be used, for instance an RSA (Ri vest, Schamir, Adelman) algorithm using appropriate private keys, thereby obtaining the encrypted hash values as indicated at the right-hand side of Figure Ic.
  • an appropriate number of public keys may be contained in the data set 103 A thereby enabling a decryption of the encrypted hash values or signatures created during the sequence as shown in Figure 1 c.
  • Figure Id schematically illustrates a sequence for verifying the signatures contained in the portion 121 A, which may be performed on the basis of the data set 103 A during start up of the system 150.
  • the verification may be accomplished on the basis of, for example, the RSA algorithm using a public key, thereby obtaining the initially created hash values, such as hash 0, hash 1, hash 2.
  • These initially created hash values may then be compared to respective hash values as may be obtained by applying the appropriate hash algorithm over the portion 121 A that is copied into the RAM memory 101.
  • the portion 121 A may then be considered as verified if the calculated hash value(s) match with the initially generated hash value(s) obtained by decrypting the signatures in the portion 121 A, as shown at the left-hand side of Figure Id.
  • a static root of trust may have to be implemented so as to enable a secure start up of an operating system after power- up or reset of the computer system under consideration.
  • a defined execution of the trusted BIOS information 121 may be accomplished by verifying at least the portion 121 A on the basis of the trusted set of data 103 A, which is substantially resistant against any external manipulation.
  • the portions 121 A, 121B upon verifying the integrity of the boot information 121, i.e., in the embodiments shown, the portions 121 A, 121B, integrity of the entire boot process may be confirmed, thereby enabling a trusted initialization of an operating system which in turn may be used for performing security sensitive applications.
  • an appropriate policy may be applied, for instance, to limit the services provided by the system or, in other illustrative embodiments, by actually disabling the boot processing.
  • the secure boot architecture disclosed herein may protect against "class breaks" which are to be understood as attacks that will work against every instance of a given security system.
  • class break a piece of software generated by an external source may be considered as class break, which may be easy to install and enable circumvention of security/protective measures, thereby enabling unauthorized use of the platform.
  • DRM digital rights management
  • a class break may already be given when the DRM protected data file may be broken once, thereby enabling a redistribution of the unprotected file.
  • mechanisms and systems disclosed herein may provide enhanced security with respect to class breaks, since protected environments may be obtained on the basis of an integral portion within the CPU itself, thereby requiring manipulation of the CPU itself, or respective deficiencies in the infrastructure for signing the boot information and maintaining the secret keys, which in both cases may require significant effort in terms of time and money.
  • FIG. 1e schematically illustrates a flow diagram for describing operation of the system 150.
  • the system 150 may be reset or power may be supplied thereto or any other event may occur that may require a secure boot processing. Consequently, an appropriate self-test may be performed by the CPU core 102 and respective components, such as registers and the like, may be initialized. It should be appreciated that, in some embodiments, a secure boot processing may not be enabled, an operating state in which the operating system may stay in control of the system 150.
  • the first instruction is fetched from the internal non- volatile memory 103 which may be accomplished by mapping the internal memory 103 to the corresponding reset vector address.
  • the CPU 100 starts execution on the basis of the secure data set 103 A in any instances in which a jump to the reset vector is caused by any external event, hi step S 120, the internal random access memory 101 may be initialized caused by the execution of the instructions contained in the set 103 A.
  • the boot information 121 for instance the portion 121a including a signature thereof, may be loaded into the internal random access memory 101.
  • integrity of the boot information 121 or the portion 12 IA may be verified by using a decryption key contained in the data set 103 A. That is, after initializing the memory 101, the signature check for the boot information 121, or at least the portion 121 A, is started.
  • hash values may be calculated on the basis of secure hash algorithms, such as SHAl wherein the one or more signatures for the boot information 121 or the portion 12 IA may be skipped.
  • additional information such as the vendor identification contained in the one time programmable memory 130, may be used in some cases and may be included for calculating one or more hash values.
  • the one or more calculated hash values may then be compared to the one or more hash values contained in a dedicated location of the data 121 or 121 A, as is also previously described with reference to Figure Ib.
  • the hash values from the one or more signatures may be retrieved using the public decryption keys contained in the data set 103 A, so as to obtain the initial hash values. If both the calculated hash values and the initial hash values match, the boot information 121, or the portion 12 IA, is considered trustworthy in step S 150, and boot processing is continued in step S 160. If the integrity check fails in step S 150, in step S 170, a corresponding boot failure may be indicated which, in one illustrative embodiment, may be accompanied by terminating the boot processing and issuing a corresponding error code.
  • the secure boot process i.e., the process flow represented by the steps Sl 00-Sl 50, may not apply any reset procedures to any components of the system 150, thereby enabling reliable "measurement" of the hardware configuration of the system 150.
  • FIG. 1 f schematically illustrates a secure boot processing according to still other illustrative embodiments.
  • step SlOl it may be decided whether or not a secure boot processing is enabled.
  • a respective indication may be obtained by setting respective security bits contained in the memory 130.
  • step SlOO execution is started from the non- volatile memory 103, as previously explained.
  • step S 102 status information may be provided, for instance, for appropriately setting an output port.
  • step S 102 it may be indicated that secure boot processing is started during the internal self-test.
  • the system 150 and in particular the CPU 100 may be initialized, which may, for instance, comprise one or more of the steps S 121 -S 129.
  • step S121 the addresses of the memory 103 may be appropriately remapped so as to ensure that the very first instruction will be fetched from the memory 103.
  • step S 122 a boot source may be detected and may be initialized in step S 123.
  • the memory 101 i.e., the data cache 101A and the instruction cache 101B, may be initialized in steps S124, S125, and unreal mode for the data cache may be set up in step S 126.
  • an image of the boot information 121 or of the portion 121 A may be copied into the data cache 101 A and, in step S 128, storage space may be assigned for variables in the data cache 101 A.
  • step S 129 the vendor identification may be retrieved.
  • step S 141 a block of the boot information 121 or portion 121 A is read and, in step S 142, a respective hash algorithm may be performed so as to obtain a first hash value.
  • step S 143 it is determined whether or not the previously read block of data was the last block or not. If not, the process flow moves back to step S 141 to read in a further block of data and in the subsequent step S 142 a hash value is calculated and updates the previously obtained value.
  • step S 143 the last block is read, in step S 144, the computed hash value is stored and, in step S145, a relevant portion of the data 121 or 121 A may be read so as to obtain the signatures contained therein.
  • the header block of the information 121 or of the portion 121 A may be used for this purpose.
  • step S 146 the one or more signatures are retrieved and, in step S 147, one or more public keys are applied to decipher the signatures obtained in step S 146.
  • step S 150 the hash value or values stored in step S 144 may be compared with the original hash values obtained by performing step S 147, thereby deciding whether the data 121 or 121 A are considered trustworthy or not.
  • step S 150 the previously initialized instruction cache may be updated with the boot data 121 or 12 IA, which is presently contained in the data cache 101 A, so as to verify the boot data therein.
  • step S 162 the status of the secure boot process may be indicated and finally, in step 163, the booting may be continued by performing instructions from the instruction cache, which may, for instance, include initialization of the system memory 110, the retrieval of any remaining portion of the boot data 121, such as the portion 121B, and the verification of the integrity thereof by calculating a hash value and comparing the calculated hash value with an original hash value included in the portion 121 A.
  • a corresponding status information for example, OxCD
  • step S 172 in one illustrative embodiment, execution may be terminated.
  • the systems and mechanisms disclosed herein provide enhanced integrity of computer platforms by providing a secure boot processing on the basis of a pre-boot routine contained in a non-volatile memory, which may not be overwritten once data are programmed into the non-volatile memory. Since the non-volatile memory is a part of the CPU itself, system initialization may be accomplished on the basis of the pre-boot information stored in the non-volatile internal memory, which may also include appropriate decryption keys that may be applied to a signed boot information or at least to a signed portion of the boot information.
  • the process for calculating appropriate hash values for the boot information or a portion thereof and a comparison with originally created values stored in encrypted form in the boot information may be accomplished by using the internal random access memory of the CPU, thereby preventing the possibility of external access and thus the possibility of manipulating the system configuration.
  • the internally stored pre-boot information may be used as a core root of trust for measurement during system initialization.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Storage Device Security (AREA)
  • Stored Programmes (AREA)

Abstract

A secure boot processing may be accomplished on the basis of a non- volatile memory (103) that is an integral part of the CPU (100) and which may not be modified once a pre- boot information may be programmed into the non- volatile memory (103). During a reset event or a power-on event, execution may be started from the internal non-volatile memory (103), which may also include public decryption keys for verifying a signature of a portion of a boot routine. The verification of the respective portion of the boot routine may be accomplished by using internal random access memories (101), thereby avoiding external access during verification of the boot routine. Hence, a high degree of tamper resistance may be obtained, for instance, with respect to BIOS modification by exchanging BIOS chips.

Description

A COMPUTER SYSTEM COMPRISING A SECURE BOOT MECHANISM
BACKGROUND FIELD OF THE DISCLOSURE
The present disclosure generally relates to the field of computer systems of enhanced integrity and corresponding mechanisms implemented therein, which may enable the provision of enhanced security standards, thereby enhancing efficiency of applications requiring a secure computer platform.
DESCRIPTION OF THE RELATED ART
The widespread use of computer systems has led to a significant increase of information processing on the basis of electronic computer systems, thereby involving the creation, distribution and processing of very large amounts of digital data. With the increasing resources of computer systems in view of data storage capacity and increased processing speed, the reproduction of large data sets, such as audio data, movies and the like, has become available for an increasing number of persons and is frequently practiced despite any protective rights, which may be associated with many of the data provided in electronic form. Thus, significant economic damage may be created by the illegal copying, storage and redistribution of electronic data. Furthermore, the distribution of application programs over widespread networks, such as the internet, may also provide the possibility of distributing malicious software applications, which may in turn be used for manipulating data and/or the configuration of a respective computer platform. For example, significant damage may be created in private environments, and in particular in the industry, by introducing software applications which may, for instance, manipulate software files such as stored data, communicate information via the internet without knowledge of the actual user of the platform, start a denial of service attack, thereby possibly rendering the platform to be no longer usable for a dedicated application requiring a specific status of the platform.
For these reasons, great efforts are being made in developing mechanisms for enhancing integrity of the computer platforms to reduce the probability for "successful" external attacks, for instance in the form of malicious software, denial of service attacks, sniffing, spoofing and the like, and also to enhance data integrity with respect to internal manipulations of the computer platform. For example, a plurality of encryption techniques are available, such as symmetric or asymmetric encryption/decryption techniques which enable the exchange of data with a high degree of resistance against tampering data by a third party during the transmission and storage of data. For example, in asymmetric encryption techniques, a pair of a private key and a public key may be used for encrypting data by means of one of the keys and deciphering the data by using the other key, wherein one of the keys may be publicly accessible. Although these techniques may provide enhanced integrity in data communication and data storage, the actual configuration of a computer platform under consideration may still provide the possibility of a plurality of attacks, in particular, as many applications intended for increasing computer security may rely on a trusted platform configuration.
A trusted computer platform may be considered as a computer system in which the hardware configuration as well as the software applications may be assumed to be in a dedicated configuration. However, a secure platform configuration may be established only by establishing a "chain" of trusted platform levels, wherein each subsequent level may be initialized by the preceding level only, if the integrity of the subsequent level has been verified. Hence, the integrity at system level may be preserved through a chain of integrity verifications wherein a root of the chain of verification steps may have to be provided with a high degree of tamper resistance so as to also accomplish a high confidence with respect to integrity of the system after initializing the highest level, i.e., the level of user applications.
In a typical computer platform, the initialization of the system requires various degrees of abstraction, for example with respect to initializing the central processing unit (CPU), initializing the system memory, which is typically provided externally to the CPU, loading an operating system into the system memory from an external mass storage device, and finally executing user applications. Thus, in view of enhancing the overall integrity of the system as a whole, it may not be sufficient to assume that the various system activities prior to loading the operating system can be considered to be secure so as to rely on the integrity of the operating system and the user application, since the operating system may be invoked by a "mistrusted" process, thereby providing the opportunity of manipulating the basic platform configuration by modifying hardware and software components. Hence, the process of initializing the various hardware components of the computer system, such as the system memory and the execution of the instructions contained therein for initializing the higher system levels, which may also be referred to as boot strapping or booting, may have to be incorporated into the chain of trust to provide enhanced overall system integrity. A typical start sequence for initializing a computer system after applying power or after a reset event causes a "power on self-test" of the CPU, wherein also the processor starts execution of instructions at a dedicated entry address that is indicated by the processor's reset vector. That is, after an initial processor self-test, the execution of instructions may start at the entry point which may typically be an address of a software routine, frequently referred to as BIOS (basic input/output system), which may be stored in a dedicated external nonvolatile memory of the computer platform. Under the control of the BIOS, the remaining self-test may be performed and the hardware configuration of the platform may be determined or "measured." Thereafter, a search for a bootable device may be performed, such as a mass storage device, for instance the hard disk of the computer system, a disk, a CD-ROM, an extension card and the like, from which a primary boot block may be loaded into the system memory, wherein control is then passed to the primary boot block, which may load an operating system into the system memory.
Although great efforts have been made in also enhancing security of the entire boot process, it is difficult to provide a reliable core root of trust for measurement (CRTM) for the boot process, for example in view of platform modifications such as replacement of the nonvolatile memory chip including the BIOS software, since a corresponding chip replacement may therefore interrupt the chain of trust, thereby also rendering all subsequent verification steps as not trustworthy.
The present disclosure is directed to various devices and methods that may avoid, or at least reduce, the effects of one or more of the problems identified above.
SUMMARY OF THE DISCLOSURE
The following presents a simplified summary of the disclosure in order to provide a basic understanding of some aspects disclosed herein. This summary is not an exhaustive overview, and it is not intended to identify key or critical elements of the invention or to delineate the scope of the invention. Its sole purpose is to present some concepts in a simplified form as a prelude to the more detailed description that is discussed later.
Generally, the present disclosure relates to devices and mechanisms for enhancing integrity of computer systems by establishing a static root of trust for measurement in that a certain set of data is provided that may include executable instructions and data values, which may be accessed by the microprocessor at start up in any case without providing the possibility of circumventing access to the dedicated data set so that a defined root for the initialization of the platform is obtained. Furthermore, the set of data is implemented in such a manner that a high level of resistance against any attacks for manipulation may be achieved. During execution of instructions contained in the set of data, the corresponding routine may not be changed or interrupted, thereby providing a high degree of integrity of this set of data, which may thus be considered as a pre-boot set of instructions and data values. Since processing of the respective instructions of the pre-boot data is mandatory at the start up time of the system under consideration, a chain of trusted software may be started, thereby enabling establishment of a high degree of system integrity, since the dedicated set of pre- boot data represents the static core root for the chain of subsequent verification steps. For this purpose, the pre-boot data set may be maintained in a non-volatile memory in the CPU core itself, thereby substantially avoiding any attacks with respect to replacing BIOS chips and the like.
One illustrative method disclosed herein relates to starting a computer system. The method comprises accessing a first set of data stored in a non-volatile memory area of a central processing unit (CPU), wherein the first set of data includes first instructions causing a core circuit of the CPU to initialize a random access memory of the CPU. The method further comprises loading an image of a second set of data from a non-volatile memory into the initialized random access memory, wherein the second set of data comprises a signature for verifying integrity of the second set of data and further comprises second instructions that cause the CPU to initialize a system memory of the computer system. Moreover, the method comprises verifying the integrity of the second set of data by using the signature and a decryption key included in the first set of data. Finally, the method comprises initializing the system memory using the second instructions when verification of the second set of data has been successful.
A further illustrative method disclosed herein relates to starting a computer system and comprises, upon at least one of a power-up event and a reset event, accessing an internal non- volatile memory of a CPU. The non-volatile memory contains pre-boot instructions and data values for initializing an internal random access memory of the CPU and for verifying an integrity of at least a portion of boot instructions and boot data values stored in a non- volatile memory of the computer system. The method further comprises loading the portion of the boot instructions and boot data values from the non- volatile memory into the internal random access memory by executing the pre-boot instructions. Moreover, integrity of at least a portion of the boot instructions and boot data values is verified by executing the pre- boot instructions. Finally, the method comprises, after successfully verifying integrity of the at least a portion of the boot instructions and boot data values, executing the boot instructions.
One illustrative central processing unit (CPU) disclosed herein comprises a substrate having formed thereon circuit elements defining a CPU core, a random access memory, a non-volatile memory and a bus system for connecting the CPU core, the random access memory and the non-volatile memory. Furthermore, the CPU comprises pre-boot information stored in the non-volatile memory, wherein the pre-boot information includes instructions executable by the CPU core and also comprises data values for initializing the volatile random access memory and verifying at least a portion of a boot routine to be supplied from an external memory device.
In a further illustrative aspect disclosed herein, the central processing unit described above may be a part of a computer system comprising, in addition to the CPU, a system memory, a memory device containing the boot routine and an interface system for connecting the system memory and the memory device including the boot routine with the CPU.
BRIEF DESCRIPTION OF THE DRAWINGS
The disclosure may be understood by reference to the following description taken in conjunction with the accompanying drawings, in which like reference numerals identify like elements, and in which:
Figure Ia schematically illustrates a central processing unit (CPU) including a random access memory (cache), a CPU core and a non-volatile memory including pre-boot information, according to illustrative embodiments;
Figure Ib schematically illustrates a computer system including a CPU including internal pre-boot information, according to other illustrative embodiments; Figure Ic schematically illustrates process steps for manipulating bootstrap data including instructions and data values during a process for creating a signature of a first portion of the boot information, according to illustrative embodiments;
Figure Id schematically illustrates a process for verifying a signature of a portion of the boot information, according to illustrative embodiments;
Figure 1 e illustrates a flow diagram for describing operation of the computer system as shown in Figure Ib, according to one illustrative embodiment; and
Figure If illustrates a flow diagram describing operation of a computer system including a CPU, such as the CPU of Figure Ia, according to still other illustrative embodiments.
While the subject matter disclosed herein is susceptible to various modifications and alternative forms, specific embodiments thereof have been shown by way of example in the drawings and are herein described in detail. It should be understood, however, that the description herein of specific embodiments is not intended to limit the invention to the particular forms disclosed, but on the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the invention as defined by the appended claims.
DETAILED DESCRIPTION
Various illustrative embodiments are described below. In the interest of clarity, not all features of an actual implementation are described in this specification. It will of course be appreciated that in the development of any such actual embodiment, numerous implementation-specific decisions must be made to achieve the developers' specific goals, such as compliance with system-related and business-related constraints, which will vary from one implementation to another. Moreover, it will be appreciated that such a development effort might be complex and time-consuming, but would nevertheless be a routine undertaking for those of ordinary skill in the art having the benefit of this disclosure.
The present subject matter will now be described with reference to the attached figures. Various structures, systems and devices are schematically depicted in the drawings for purposes of explanation only and so as to not obscure the present disclosure with details that are well known to those skilled in the art. Nevertheless, the attached drawings are included to describe and explain illustrative examples of the present disclosure. The words and phrases used herein should be understood and interpreted to have a meaning consistent with the understanding of those words and phrases by those skilled in the relevant art. No special definition of a term or phrase, i.e., a definition that is different from the ordinary and customary meaning as understood by those skilled in the art, is intended to be implied by consistent usage of the term or phrase herein. To the extent that a term or phrase is intended to have a special meaning, i.e., a meaning other than that understood by skilled artisans, such a special definition will be expressly set forth in the specification in a definitional manner that directly and unequivocally provides the special definition for the term or phrase.
Generally, the present disclosure provides a system and a mechanism for executing, at start up or reset or any other operational state requiring an initialization of the system, instructions and using data stored in a non-volatile memory representing a part of a central processing unit, thereby significantly reducing the possibility of manipulating the set of data included in the non- volatile memory. Consequently, the contents of the non- volatile memory may be used as a static root of trust for measurement during the initialization of the CPU and the entire computer system by ensuring that, upon power-up or reset of the CPU, the first instruction is fetched from the non-volatile memory. Thus, the set of data contained therein may serve as a pre-boot or pre-BIOS component which may enable the initialization of further system components, such as an internal random access memory, which may be used for storing operational data like variables and stack and instructions for running a portion of BIOS software. For instance, the data cache as part of the random access memory area and an instruction cache may be initialized by the pre-boot data of the internal non-volatile memory, thereby substantially avoiding the possibility of external access to data contained therein during the initialization process. That is, the random access memory area, i.e., the data cache and the instruction cache, are CPU-internal components and unwanted manipulation may be very difficult, in particular as the external system memory is not initialized at this stage. Depending on the storage capacity of the random access memory, the BIOS routine may be divided into two or more portions such that verification of one or more signatures in view of BIOS integrity may be performed in the random access memory for the first portion that is configured to have a size so as to fit into the instruction cache. Thus, this portion of the boot information may, after verifying the integrity thereof, be executed directly from the random access memory. Consequently, during initialization of the random access memory and loading the portion of the boot information by executing the pre-boot instructions, the pre-boot information may not be accessed externally, thereby substantially avoiding any manipulation of the first signature verification process. In some illustrative embodiments, the pre-boot information may be accessed after signature verification by an external application, for instance for accessing decryption keys for evaluating the integrity of BIOS upgrade versions and the like.
Consequently, after signature verification of the first portion of the boot information, flow control may be passed to this portion and the further boot processing may be continued by initializing the system memory and copying the remaining boot information while also verifying integrity of the further portion of the boot information. Consequently, the data, i.e., the instructions and data values, contained in the non- volatile memory provided as an integral part of the CPU may be used as a static core root of trust for measurement, thereby providing a computer platform in which a tamper-resistant hardware and software configuration may be achieved. In particular, in view of attacks, such as replacement of the BIOS chip, the mechanism of embodiments disclosed herein may provide enhanced security for typical practical applications which use the platform in the context of financial transactions or digital rights management, which may be based on the requirement of a trustworthy computer platform.
Figure Ia schematically illustrates a central processing unit (CPU) 100 according to illustrative embodiments in which a core root of trust for measurement (CRTM) is implemented with a high degree of tamper resistance. The CPU 100 may comprise a CPU core 102 which may include components for data processing, such as performing arithmetic operations, logic operations and the like. The CPU core 102 is functionally connected to a random access memory 101 which may comprise a plurality of static RAM cells and the like, as is compatible with the overall configuration of the CPU 100. In one illustrative embodiment, the RAM 101 may comprise a first memory portion, also indicated as data cache 101 A, and a second portion indicated as instruction cache 101 B. For example, the RAM 101 may be implemented in a fast memory technology to enhance the overall performance of the CPU 100, as is typically required in sophisticated integrated circuits. It should be appreciated, however, that any appropriate memory technology may be used for the memory 101 as long as direct control of the memory 101 via the CPU core 102 may be accomplished without the possibility of external access during initialization of the CPU 100.
Furthermore, the CPU 100 may comprise a non- volatile memory 103, which may be provided in any appropriate memory technology, for instance in the form of a flash memory or any other read-only memory technique, which may not enable external access for modifying the contents of the memory 103. Hence, the memory 103 may be considered as a secure memory area, the contents of which may therefore represent a static root of trust. For this purpose, a set of data 103 A, which is to be understood as instructions executable by the CPU core 102 and data values representing operands and the like of the instructions, is provided, at least in a portion of the memory 103, which may not be overwritten with new data once the respective portion of the memory 103 is programmed. The memory 103 containing the set of data 103 A may be connected to the CPU core 102 by means of a bus system 104 such that, upon power-up or reset, a jump to a specified address of the memory 103 is performed. Consequently, a "hard- wired" target for a reset vector of the CPU core 102 may be provided which ensures that execution of instructions may start from the secure memory 103, at least for a power-up event and a reset event.
It should be appreciated that the CPU 100 may be formed on the basis of sophisticated semiconductor manufacturing techniques in which an appropriate carrier material, such as a semiconductor substrate and the like, may receive a plurality of circuit elements formed on the basis of a technology under consideration, such as CMOS processes and the like, in which transistor elements, capacitors, resistors and the like may be formed in accordance with a specific device architecture for the CPU 100. In the embodiment illustrated here, the various components of the CPU 100 may therefore be formed on a common substrate during a common manufacturing process flow, thereby providing the memories 101 and 103 as internal or integral components of the device 100. For example, respective manufacturing techniques are well established in which volatile and fast memory cells may be formed together with non-volatile memory cells and high performance logic gates as may be required in the CPU core 102. Additionally, appropriate mechanisms may be provided such that, after programming the memory 103, or at least a portion thereof, including the set of data 103 A, further access for changing data bits may be prevented so as to provide a protected environment for the data set 103 A. Figure Ib schematically illustrates a computer system 150 comprising the CPU 100 providing the protected environment for the set of data 103 A, as previously explained, wherein, in the embodiment shown, the CPU 100 may comprise the random access memory 101 in the form of the data cache 101 A and the instruction cache 101 B, which may have a size of, for example, 64 kB so as to accommodate a portion of boot information and to act as a "system RAM" when performing instructions of the data set 103 A. Similarly, the instruction cache 101 B may be provided with a size of 64 kB, wherein it should be appreciated that any other appropriate memory size may be used that is compatible with the size of a respective portion of boot information that is to be performed from the memory 101 during a verification process. Similarly, the internal non- volatile memory 103 may be provided with any appropriate size, for instance 32k, so as to be compatible with the requirements for the data 103 A representing the core root of trust for measurement for the computer system 150. For example, the set of data 103 A may comprise instructions and data values representing a secure load routine for loading a respective portion of boot information into the internal memory 101 for performing a verification process. Additionally, the set of data 103 A may comprise one or more decryption keys which may represent public keys of an asymmetric encryption/decryption algorithm so as to enable a signed portion of the boot information to be verified within the memory 101. It should be appreciated that the number of public keys in the data set 103 A may be selected in accordance with safety considerations, for instance in view of maintaining an appropriate infrastructure for providing respective key pairs with a high degree of integrity and the like.
The computer system 150 may further comprise a system memory 1 10, for instance in the form of any appropriate memory device including random access memory cells, such as dynamic RAM cells and the like. The size of the system memory 110 may be adapted to the requirements of the system 150 in view of performance and storage capacity. Furthermore, the system 150 may comprise a non- volatile memory 120, such as a flash memory and the like, which may include information, also referred to as BIOS information, at least a portion of which may be a signed portion, that is, the signed portion may comprise a signature obtained on the basis of an appropriate hash algorithm in combination with an encryption mechanism, for which one or more appropriate decryption keys may be contained in the set of data 103 A, as previously explained. In one illustrative embodiment, the non- volatile memory 120 may contain the boot information that is divided into two portions, wherein a first portion may comprise data and instructions for initializing other system components, such as the system memory 110, for accommodating the second portion of boot information and executing the second portion once the first portion has been verified on the basis of the protected environment provided by the CPU 100. A more detailed configuration of the boot information within the non- volatile memory 120 will be described later on with reference to Figures Ic and Id.
The computer system 150 may further comprise an interface system 140 configured to operatively connect the system memory 1 10 and the non- volatile memory 120 with the CPU 100. In one illustrative embodiment, the system 150 may further comprise a one-time programmable memory 130, which may include platform-specific information, for instance about boot sources and related parameters. For instance, as shown, the one-time programmable memory 130 may comprise information concerning boot options in order to indicate to the CPU 100 whether to boot from the internal memory 103 or not. Furthermore, security bits provided in the memory 130 may include a respective bit that determines where the initial instruction fetch of the CPU 100 after reset is rooted to. For example, with this bit set to "1," execution may be passed to the internal memory 103, thereby enabling secure boot processing. In some instances, it may be desirable to disable the secure boot functionality for development/debug purposes. In other cases, depending on platform requirements, it may also be desirable to disable or bypass trusted platform security features. In this case, a change of the state of this bit may not be allowable during the secure boot processing. For this purpose, all debug modes (JTAG, ...) are disabled at least during the boot time. After disabling respective debug modes, execution of the secure boot process may be performed, as will be described later on in more detail. Similarly, the memory 130 may include a bit for controlling debug features during the secure boot process, which may be advantageous during development periods, while, for production, a respective control of debug features is to be disabled. In addition to these security bits, the memory 130 may comprise other information, such as the vendor identification or any unique number which may be usable for digital rights management applications and the like. It should be appreciated that, in other illustrative embodiments, the one-time programmable memory 130 may be omitted or may be provided so as to include other information controlling the secure boot processing during development and actual application. Figure Ic schematically illustrates the configuration of boot information 121 that may be stored in the non- volatile memory 120. In the embodiment shown in Figure Ic, the boot information 121, which may also be referred to as BIOS, may comprise a first portion 121 A, which may represent a set of data including instructions and data values having a size so as to be compatible with the size of the memory 101, as previously explained. For example, for the above-given exemplary values of 64 kB for each of the RAM areas 101 A, 101 B, a maximum size of the portion 121 A may be restricted to approximately 32 kB. It should be appreciated, however, that any other appropriate size of the portion 121 A may be applied, depending on the available amount of storage within the RAM 101. It should further be appreciated that providing the portion 121 A may be necessary for boot information 121 which exceeds the size of the memory 101 so that the entire boot processing may not be performed on the basis of the memory 101 since typical boot routines may have a size of several hundred kByte and more. In other cases, when sufficient storage space may be available, the boot information 121 as a whole may be used during the secure boot processing, as will be discussed later on in more detail.
Thus, if the portion 12 IA may be provided, as shown in Figure Ic, it may serve as an initial BIOS "loader" for a second portion 121B, wherein the first portion 121 A may contain therein a hash value obtained over the portion 121 B. The hash value for the portion 121B may also be protected by the signature contained in the portion 121 A on the basis of a hash value obtained over the first portion 12 IA, which may be accomplished in a dedicated trust center. Thus, encryption of the hash value of the second portion may not be necessary. The signature of the hash value(s) for the portion 121 A may be used for verifying the portion 12 IA during a secure boot processing. The portion 121 A may therefore be configured to perform necessary platform initialization actions, such as initialization of a memory controller and the like, followed by shadowing the portion 12 IB from the memory 120 into the initialized system memory 110.
Upon execution of the portion 121 A, a hash value may also be calculated over the image 121B copied into the system memory 110, which may then be compared with the hash value initially contained in the portion 121 A. Thus, integrity of the portion 12 IB may be verified on the basis of the hash value contained in the portion 121 A, thereby providing a trusted chain of integrity. Consequently, as shown in Figure Ic, the portion 121 A may be processed so as to obtain a signature, which may be accomplished in an appropriate trust center on the basis of an appropriate trustworthy environment. For this purpose, secure hash algorithms may be applied to provide one or more hash values, for instance indicated as hash 0, hash 1, hash 2 in combination with appropriate control data. Thereafter, any appropriate encryption technique may be used, for instance an RSA (Ri vest, Schamir, Adelman) algorithm using appropriate private keys, thereby obtaining the encrypted hash values as indicated at the right-hand side of Figure Ic. As previously explained, an appropriate number of public keys may be contained in the data set 103 A thereby enabling a decryption of the encrypted hash values or signatures created during the sequence as shown in Figure 1 c.
Figure Id schematically illustrates a sequence for verifying the signatures contained in the portion 121 A, which may be performed on the basis of the data set 103 A during start up of the system 150. The verification may be accomplished on the basis of, for example, the RSA algorithm using a public key, thereby obtaining the initially created hash values, such as hash 0, hash 1, hash 2. These initially created hash values may then be compared to respective hash values as may be obtained by applying the appropriate hash algorithm over the portion 121 A that is copied into the RAM memory 101. The portion 121 A may then be considered as verified if the calculated hash value(s) match with the initially generated hash value(s) obtained by decrypting the signatures in the portion 121 A, as shown at the left-hand side of Figure Id.
With reference to Figures Ie and If, operation of the system 150 according to illustrative embodiments will be described in more detail during a secure boot processing. As previously explained, in view of providing a secure platform, a static root of trust may have to be implemented so as to enable a secure start up of an operating system after power- up or reset of the computer system under consideration. For this purpose, a defined execution of the trusted BIOS information 121 may be accomplished by verifying at least the portion 121 A on the basis of the trusted set of data 103 A, which is substantially resistant against any external manipulation. Thus, each time the system is activated, a secure boot process is initiated, wherein, by using cryptographic methods, integrity verification of the initial hardware and software configuration may be achieved. Hence, upon verifying the integrity of the boot information 121, i.e., in the embodiments shown, the portions 121 A, 121B, integrity of the entire boot process may be confirmed, thereby enabling a trusted initialization of an operating system which in turn may be used for performing security sensitive applications. On the other hand, if the integrity test may fail, for instance during verifying of the portions 121 A or 121 B, an appropriate policy may be applied, for instance, to limit the services provided by the system or, in other illustrative embodiments, by actually disabling the boot processing.
Thus, the secure boot architecture disclosed herein may protect against "class breaks" which are to be understood as attacks that will work against every instance of a given security system. For example, a piece of software generated by an external source may be considered as class break, which may be easy to install and enable circumvention of security/protective measures, thereby enabling unauthorized use of the platform. In digital rights management (DRM) environments, a class break may already be given when the DRM protected data file may be broken once, thereby enabling a redistribution of the unprotected file. Consequently, mechanisms and systems disclosed herein may provide enhanced security with respect to class breaks, since protected environments may be obtained on the basis of an integral portion within the CPU itself, thereby requiring manipulation of the CPU itself, or respective deficiencies in the infrastructure for signing the boot information and maintaining the secret keys, which in both cases may require significant effort in terms of time and money.
Figure Ie schematically illustrates a flow diagram for describing operation of the system 150. In step SlOO, the system 150 may be reset or power may be supplied thereto or any other event may occur that may require a secure boot processing. Consequently, an appropriate self-test may be performed by the CPU core 102 and respective components, such as registers and the like, may be initialized. It should be appreciated that, in some embodiments, a secure boot processing may not be enabled, an operating state in which the operating system may stay in control of the system 150. In step SI lO, the first instruction is fetched from the internal non- volatile memory 103 which may be accomplished by mapping the internal memory 103 to the corresponding reset vector address. Consequently, the CPU 100 starts execution on the basis of the secure data set 103 A in any instances in which a jump to the reset vector is caused by any external event, hi step S 120, the internal random access memory 101 may be initialized caused by the execution of the instructions contained in the set 103 A. In step S 130, at least a portion of the boot information 121, for instance the portion 121a including a signature thereof, may be loaded into the internal random access memory 101. In step S 140, integrity of the boot information 121 or the portion 12 IA may be verified by using a decryption key contained in the data set 103 A. That is, after initializing the memory 101, the signature check for the boot information 121, or at least the portion 121 A, is started. For this purpose, in some illustrative embodiments, hash values may be calculated on the basis of secure hash algorithms, such as SHAl wherein the one or more signatures for the boot information 121 or the portion 12 IA may be skipped. Furthermore, additional information, such as the vendor identification contained in the one time programmable memory 130, may be used in some cases and may be included for calculating one or more hash values. The one or more calculated hash values may then be compared to the one or more hash values contained in a dedicated location of the data 121 or 121 A, as is also previously described with reference to Figure Ib. To this end, the hash values from the one or more signatures may be retrieved using the public decryption keys contained in the data set 103 A, so as to obtain the initial hash values. If both the calculated hash values and the initial hash values match, the boot information 121, or the portion 12 IA, is considered trustworthy in step S 150, and boot processing is continued in step S 160. If the integrity check fails in step S 150, in step S 170, a corresponding boot failure may be indicated which, in one illustrative embodiment, may be accompanied by terminating the boot processing and issuing a corresponding error code.
In the above-described embodiment, before passing execution to the boot information 121 or the portion 12 IA, the secure boot process, i.e., the process flow represented by the steps Sl 00-Sl 50, may not apply any reset procedures to any components of the system 150, thereby enabling reliable "measurement" of the hardware configuration of the system 150.
Figure 1 f schematically illustrates a secure boot processing according to still other illustrative embodiments. As shown, in step SlOl, it may be decided whether or not a secure boot processing is enabled. A respective indication may be obtained by setting respective security bits contained in the memory 130. According to step SlOO, execution is started from the non- volatile memory 103, as previously explained. In step S 102, status information may be provided, for instance, for appropriately setting an output port. For example, in step S 102, it may be indicated that secure boot processing is started during the internal self-test. In step S 120, the system 150 and in particular the CPU 100 may be initialized, which may, for instance, comprise one or more of the steps S 121 -S 129. For example, in step S121, the addresses of the memory 103 may be appropriately remapped so as to ensure that the very first instruction will be fetched from the memory 103. In step S 122, a boot source may be detected and may be initialized in step S 123. Furthermore, the memory 101, i.e., the data cache 101A and the instruction cache 101B, may be initialized in steps S124, S125, and unreal mode for the data cache may be set up in step S 126. Furthermore, an image of the boot information 121 or of the portion 121 A may be copied into the data cache 101 A and, in step S 128, storage space may be assigned for variables in the data cache 101 A. Finally, if required, in step S 129, the vendor identification may be retrieved.
In step S 141, a block of the boot information 121 or portion 121 A is read and, in step S 142, a respective hash algorithm may be performed so as to obtain a first hash value. In step S 143, it is determined whether or not the previously read block of data was the last block or not. If not, the process flow moves back to step S 141 to read in a further block of data and in the subsequent step S 142 a hash value is calculated and updates the previously obtained value. When, in step S 143, the last block is read, in step S 144, the computed hash value is stored and, in step S145, a relevant portion of the data 121 or 121 A may be read so as to obtain the signatures contained therein. For example, the header block of the information 121 or of the portion 121 A may be used for this purpose. In step S 146, the one or more signatures are retrieved and, in step S 147, one or more public keys are applied to decipher the signatures obtained in step S 146. In step S 150, the hash value or values stored in step S 144 may be compared with the original hash values obtained by performing step S 147, thereby deciding whether the data 121 or 121 A are considered trustworthy or not.
If the hash values match in step S 150, the previously initialized instruction cache may be updated with the boot data 121 or 12 IA, which is presently contained in the data cache 101 A, so as to verify the boot data therein. In step S 162, the status of the secure boot process may be indicated and finally, in step 163, the booting may be continued by performing instructions from the instruction cache, which may, for instance, include initialization of the system memory 110, the retrieval of any remaining portion of the boot data 121, such as the portion 121B, and the verification of the integrity thereof by calculating a hash value and comparing the calculated hash value with an original hash value included in the portion 121 A. When integrity is not confirmed in step S 150, in step S 171, a corresponding status information (for example, OxCD) may be provided and. in step S 172, in one illustrative embodiment, execution may be terminated.
As a result, the systems and mechanisms disclosed herein provide enhanced integrity of computer platforms by providing a secure boot processing on the basis of a pre-boot routine contained in a non-volatile memory, which may not be overwritten once data are programmed into the non-volatile memory. Since the non-volatile memory is a part of the CPU itself, system initialization may be accomplished on the basis of the pre-boot information stored in the non-volatile internal memory, which may also include appropriate decryption keys that may be applied to a signed boot information or at least to a signed portion of the boot information. The process for calculating appropriate hash values for the boot information or a portion thereof and a comparison with originally created values stored in encrypted form in the boot information may be accomplished by using the internal random access memory of the CPU, thereby preventing the possibility of external access and thus the possibility of manipulating the system configuration. Hence, the internally stored pre-boot information may be used as a core root of trust for measurement during system initialization.
The particular embodiments disclosed above are illustrative only, as the invention may be modified and practiced in different but equivalent manners apparent to those skilled in the art having the benefit of the teachings herein. For example, the process steps set forth above may be performed in a different order. Furthermore, no limitations are intended to the details of construction or design herein shown, other than as described in the claims below. It is therefore evident that the particular embodiments disclosed above may be altered or modified and all such variations are considered within the scope and spirit of the invention. Accordingly, the protection sought herein is as set forth in the claims below.

Claims

CLAIMS WHAT IS CLAIMED:
1. A method for starting a computer system (150), the method comprising: accessing a first set of data (103A) stored in a non- volatile memory (103) of a central processing unit (100), said first set of data (103A) including first instructions causing a core circuit (102) of said central processing unit (100) to initialize an internal volatile memory (101) of said central processing unit; loading an image of a second set of data (121) from a non-volatile memory (120) into said initialized internal volatile memory (101), said second set of data (121) comprising a signature for verifying integrity of said second set of data (121), said second set of data (121) further comprising second instructions (121A) causing said central processing unit (100) to initialize a system memory (1 10) of said computer system (100); verifying said integrity of said second set of data (121) by using said signature and a decryption key included in said first set of data; and initializing said system memory (1 10) using said second instructions (121A) when verification of said second set of data (121) is successful.
2. The method of claim 1 , further comprising: loading a third set of data (121B) from said non- volatile memory (120) into said system memory (110) and verifying an integrity of said third set of data (121B); and executing third instructions (121B) included in said third set of data (121B), said third instructions (121B) causing an operating system to be loaded into said system memory (120) from a bootable device connected to said computer system (150).
3. The method of claim 2, wherein verifying integrity of said third set of data (121B) comprises determining a hash value for said third set of data (121B) and comparing said determined hash value with an initial hash value of said third set of data (121B) contained in said second set of data (121 A).
4. The method of claim 1, wherein initializing said internal volatile memory (101) comprises initializing a data cache (101 A) and an instruction cache (101 B) of said central processing unit (100) and wherein said second data of data (121A) is loaded into said data cache (101 A), and the method further comprises copying said second set of data (121A) into said instruction cache (101 B) when integrity of said second set of data (121A) has been verified successfully so as to execute said second instructions (121 A).
5. The method of claim 1, wherein loading said second set of data (121) into said internal volatile memory (101) comprises performing a hash algorithm to determine a hash value of said second set of data (121) and verifying an integrity of said second set of data (121) comprises comparing said hash value of said second set of data (121) with an initial hash value obtained by applying said encryption key to said signature.
6. The method of claim 1, wherein said first set of data (103A) is accessed whenever said central processing unit (100) is reset or powered up.
7. The method of claim 1 , further comprising remapping addresses of said first set of data (103A) within a virtual address space of said central processing unit (100) so as to allow external access to at least said decryption key after successful verification of said second set of data (121).
8. The method of claim 1, further comprising providing status information on at least a verification status of said second set of data (121).
9. The method of claim 1, further comprising copying said first set of data (103A) into said system memory (120).
10. The method of claim 1, wherein the first set of data (103A) comprises pre- boot instructions and data values for initializing said internal volatile memory (103) of said central processing unit (100) and said second set of data (121) comprises boot instructions and boot data values.
11. A central processing unit (CPU) (100), comprising: a substrate having formed thereon circuit elements defining a CPU core (102), a volatile random access memory (101), a non-volatile memory (103) and a bus system (104) for connecting said CPU core (102), said volatile random access memory (101) and said non-volatile memory (103); and pre-boot information (103A) stored in said non-volatile memory (103), said pre-boot information (103A) including instructions executable by said CPU core (102) and data values for initializing said volatile random access memory (101) and verifying at least a portion of a boot routine.
12. The central processing unit (100) of claim 11, wherein said pre-boot information (103A) includes one or more decryption keys configured to enable deciphering of a signature of said at least a portion of said boot routine.
PCT/US2009/001289 2008-02-29 2009-02-27 A computer system comprising a secure boot mechanism WO2009108371A1 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
JP2010548742A JP2011527777A (en) 2008-02-29 2009-02-27 Computer system with a secure startup mechanism
KR1020107021808A KR101237527B1 (en) 2008-02-29 2009-02-27 A computer system comprising a secure boot mechanism
EP09716112A EP2250599A1 (en) 2008-02-29 2009-02-27 A computer system comprising a secure boot mechanism
CN200980106728XA CN101965570B (en) 2008-02-29 2009-02-27 A computer system comprising a secure boot mechanism

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
DE102008011925.3A DE102008011925B4 (en) 2008-02-29 2008-02-29 Safe initialization of computer systems
DE102008011925.3 2008-02-29
US12/186,821 US8656146B2 (en) 2008-02-29 2008-08-06 Computer system comprising a secure boot mechanism
US12/186,821 2008-08-06

Publications (1)

Publication Number Publication Date
WO2009108371A1 true WO2009108371A1 (en) 2009-09-03

Family

ID=40911374

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2009/001289 WO2009108371A1 (en) 2008-02-29 2009-02-27 A computer system comprising a secure boot mechanism

Country Status (8)

Country Link
US (1) US8656146B2 (en)
EP (1) EP2250599A1 (en)
JP (1) JP2011527777A (en)
KR (1) KR101237527B1 (en)
CN (1) CN101965570B (en)
DE (1) DE102008011925B4 (en)
TW (1) TWI498768B (en)
WO (1) WO2009108371A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9235710B2 (en) 2013-05-23 2016-01-12 Cisco Technology, Inc. Out of band management of basic input/output system secure boot variables
US11514167B2 (en) 2020-02-12 2022-11-29 Realtek Semiconductor Corporation Computer system having firmware verification mechanism and firmware verification method of the same

Families Citing this family (75)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9582676B2 (en) * 2005-01-31 2017-02-28 Unisys Corporation Adding or replacing disks with re-key processing
US8522066B2 (en) * 2010-06-25 2013-08-27 Intel Corporation Providing silicon integrated code for a system
US8812828B2 (en) * 2010-11-16 2014-08-19 Intel Corporation Methods and apparatuses for recovering usage of trusted platform module
US8560845B2 (en) * 2011-01-14 2013-10-15 Apple Inc. System and method for tamper-resistant booting
US20120204254A1 (en) * 2011-02-04 2012-08-09 Motorola Mobility, Inc. Method and apparatus for managing security state transitions
WO2013067486A1 (en) 2011-11-04 2013-05-10 Insyde Software Corp. Secure boot administration in a unified extensible firmware interface (uefi)- compliant computing device
JP5441984B2 (en) * 2011-11-08 2014-03-12 シャープ株式会社 Electronic device system, electronic device and storage medium
US8775784B2 (en) 2011-11-11 2014-07-08 International Business Machines Corporation Secure boot up of a computer based on a hardware based root of trust
US20130173906A1 (en) * 2011-12-29 2013-07-04 Eric T. Obligacion Cloning storage devices through secure communications links
US9262637B2 (en) * 2012-03-29 2016-02-16 Cisco Technology, Inc. System and method for verifying integrity of platform object using locally stored measurement
WO2013165383A1 (en) 2012-04-30 2013-11-07 Hewlett-Packard Development Company, L.P. Configurable computer memory
US9047471B2 (en) * 2012-09-25 2015-06-02 Apple Inc. Security enclave processor boot control
US8873747B2 (en) 2012-09-25 2014-10-28 Apple Inc. Key management using security enclave processor
CN102929674B (en) 2012-11-02 2016-02-10 威盛电子股份有限公司 Electronic installation and starting-up method
US9881161B2 (en) 2012-12-06 2018-01-30 S-Printing Solution Co., Ltd. System on chip to perform a secure boot, an image forming apparatus using the same, and method thereof
US20140164753A1 (en) * 2012-12-06 2014-06-12 Samsung Electronics Co., Ltd System on chip for performing secure boot, image forming apparatus using the same, and method thereof
US10733288B2 (en) 2013-04-23 2020-08-04 Hewlett-Packard Development Company, L.P. Verifying controller code and system boot code
EP2989579B1 (en) * 2013-04-23 2018-06-06 Hewlett-Packard Development Company, L.P. Redundant system boot code in a secondary non-volatile memory
KR101656092B1 (en) * 2013-08-13 2016-09-08 윈본드 일렉트로닉스 코포레이션 Secured computing system with asynchronous authentication
US9798880B2 (en) * 2013-11-13 2017-10-24 Via Technologies, Inc. Fuse-enabled secure bios mechanism with override feature
US10055588B2 (en) 2013-11-13 2018-08-21 Via Technologies, Inc. Event-based apparatus and method for securing BIOS in a trusted computing system during execution
US9367689B2 (en) * 2013-11-13 2016-06-14 Via Technologies, Inc. Apparatus and method for securing BIOS in a trusted computing system
US9779243B2 (en) * 2013-11-13 2017-10-03 Via Technologies, Inc. Fuse-enabled secure BIOS mechanism in a trusted computing system
US9767288B2 (en) * 2013-11-13 2017-09-19 Via Technologies, Inc. JTAG-based secure BIOS mechanism in a trusted computing system
US9183394B2 (en) 2013-11-13 2015-11-10 Via Technologies, Inc. Secure BIOS tamper protection mechanism
US9129113B2 (en) 2013-11-13 2015-09-08 Via Technologies, Inc. Partition-based apparatus and method for securing bios in a trusted computing system during execution
US9547767B2 (en) 2013-11-13 2017-01-17 Via Technologies, Inc. Event-based apparatus and method for securing bios in a trusted computing system during execution
US9507942B2 (en) * 2013-11-13 2016-11-29 Via Technologies, Inc. Secure BIOS mechanism in a trusted computing system
TWI560611B (en) * 2013-11-13 2016-12-01 Via Tech Inc Apparatus and method for securing bios
US9779242B2 (en) * 2013-11-13 2017-10-03 Via Technologies, Inc. Programmable secure bios mechanism in a trusted computing system
US10049217B2 (en) 2013-11-13 2018-08-14 Via Technologies, Inc. Event-based apparatus and method for securing bios in a trusted computing system during execution
US10095868B2 (en) 2013-11-13 2018-10-09 Via Technologies, Inc. Event-based apparatus and method for securing bios in a trusted computing system during execution
KR20150078644A (en) * 2013-12-31 2015-07-08 에릭슨엘지엔터프라이즈 주식회사 Method and apparatus for duplexing of software image
KR102227263B1 (en) * 2013-12-31 2021-03-15 삼성전자주식회사 System and Method for Changing of Secure Boot and Electronic Apparatus Equipped the System Thereof
KR20150085301A (en) * 2014-01-15 2015-07-23 삼성전자주식회사 Method of operating memory system and method of initializing memory system including the same
CN104866757B (en) * 2014-02-24 2019-01-15 联想(北京)有限公司 A kind of verification method and electronic equipment
CN106104561B (en) 2014-03-28 2019-10-22 惠普发展公司,有限责任合伙企业 Allow the method and apparatus for installing and using test key for BIOS
CN105022589A (en) * 2014-04-29 2015-11-04 光宝科技股份有限公司 Electronic device and operation method thereof
US9547778B1 (en) 2014-09-26 2017-01-17 Apple Inc. Secure public key acceleration
WO2016073411A2 (en) * 2014-11-03 2016-05-12 Rubicon Labs, Inc. System and method for a renewable secure boot
US11456876B2 (en) * 2015-03-26 2022-09-27 Assa Abloy Ab Virtual credentials and licenses
CN104866343A (en) * 2015-05-15 2015-08-26 长城信息产业股份有限公司 Security startup method for embedded equipment and securely-started embedded equipment
CN104881345B (en) * 2015-05-25 2018-10-23 上海兆芯集成电路有限公司 The method of central processing unit and computer booting self-test
CN104899524B (en) * 2015-05-25 2018-11-27 上海兆芯集成电路有限公司 The method of central processing unit and verifying motherboard data
US10467418B2 (en) * 2015-08-28 2019-11-05 Ncr Corporation Computer pre-boot security verification, enforcement, and remediation
US9996711B2 (en) * 2015-10-30 2018-06-12 Intel Corporation Asset protection of integrated circuits during transport
CN105681032B (en) * 2016-01-08 2017-09-12 腾讯科技(深圳)有限公司 Method for storing cipher key, key management method and device
US10242195B2 (en) * 2016-07-22 2019-03-26 Hewlett Packard Enterprise Development Lp Integrity values for beginning booting instructions
CN106484477B (en) * 2016-10-11 2019-11-12 上海华虹集成电路有限责任公司 The software download and starting method of safety
US11455396B2 (en) * 2017-05-12 2022-09-27 Hewlett Packard Enterprise Development Lp Using trusted platform module (TPM) emulator engines to measure firmware images
EP3673401A4 (en) 2017-08-22 2021-04-14 Absolute Software Corporation Firmware integrity check using silver measurements
CN109714303B (en) 2017-10-25 2022-05-27 阿里巴巴集团控股有限公司 BIOS starting method and data processing method
CN109710315B (en) 2017-10-25 2022-05-10 阿里巴巴集团控股有限公司 BIOS (basic input output System) flash writing method and BIOS mirror image file processing method
US10757087B2 (en) * 2018-01-02 2020-08-25 Winbond Electronics Corporation Secure client authentication based on conditional provisioning of code signature
US11741233B2 (en) 2018-06-11 2023-08-29 Hewlett-Packard Development Company, L.P. Overriding sub-system identifiers with protected variable values
JP7059127B2 (en) * 2018-06-26 2022-04-25 キヤノン株式会社 Information processing device that detects tampering with software executed at startup and its control method
CN109446815B (en) * 2018-09-30 2020-12-25 华为技术有限公司 Management method and device for basic input/output system firmware and server
WO2020159533A1 (en) 2019-02-01 2020-08-06 Hewlett-Packard Development Company, L.P. Security credential derivation
US10726133B1 (en) * 2019-02-04 2020-07-28 Dell Products L.P. Securely loading UEFI images at runtime
US11520662B2 (en) 2019-02-11 2022-12-06 Hewlett-Packard Development Company, L.P. Recovery from corruption
JP7286381B2 (en) * 2019-04-01 2023-06-05 キヤノン株式会社 Information processing device and its control method
US11347856B2 (en) * 2019-05-24 2022-05-31 Dell Products L.P. Bios method to block compromised preboot features
US11657157B2 (en) * 2019-06-06 2023-05-23 Macronix International Co., Ltd. Secure boot system, method and apparatus
CN114424166A (en) * 2019-08-28 2022-04-29 惠普发展公司,有限责任合伙企业 Encryption table signature
CN113282930B (en) * 2020-02-19 2024-03-01 瑞昱半导体股份有限公司 Computer system with firmware verification mechanism and firmware verification method thereof
US11768611B2 (en) 2020-04-02 2023-09-26 Axiado Corporation Secure boot of a processing chip
US11528276B2 (en) 2020-04-16 2022-12-13 Bank Of America Corporation System for prevention of unauthorized access using authorized environment hash outputs
US11423160B2 (en) 2020-04-16 2022-08-23 Bank Of America Corporation System for analysis and authorization for use of executable environment data in a computing system using hash outputs
US11263109B2 (en) 2020-04-16 2022-03-01 Bank Of America Corporation Virtual environment system for validating executable data using accelerated time-based process execution
US11481484B2 (en) 2020-04-16 2022-10-25 Bank Of America Corporation Virtual environment system for secure execution of program code using cryptographic hashes
US11425123B2 (en) 2020-04-16 2022-08-23 Bank Of America Corporation System for network isolation of affected computing systems using environment hash outputs
CN113553115B (en) * 2020-04-23 2024-09-10 上汽通用汽车有限公司 Starting method based on heterogeneous multi-core chip and storage medium
FR3111441B1 (en) * 2020-06-10 2022-08-05 Proton World Int Nv Secure start of an electronic circuit
US11372982B2 (en) 2020-07-02 2022-06-28 Bank Of America Corporation Centralized network environment for processing validated executable data based on authorized hash outputs
US20230083979A1 (en) * 2021-09-10 2023-03-16 Ampere Computing Llc Method and system for secure boot and rma intervention

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010007131A1 (en) * 1997-09-11 2001-07-05 Leonard J. Galasso Method for validating expansion roms using cryptography
US20050076226A1 (en) * 2003-10-01 2005-04-07 International Business Machines Corporation Computing device that securely runs authorized software
EP1659472A1 (en) * 2004-11-22 2006-05-24 Research In Motion Limited Method and Device for Authenticating Software

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH07146788A (en) * 1993-11-22 1995-06-06 Fujitsu Ltd System and method for preparing virus diagnostic mechanism and virus diagnostic mechanism and diagnostic method
JP3293760B2 (en) * 1997-05-27 2002-06-17 株式会社エヌイーシー情報システムズ Computer system with tamper detection function
JPH1139158A (en) * 1997-07-18 1999-02-12 Nippon Telegr & Teleph Corp <Ntt> Method for protecting executed program and its device
JP2002366748A (en) * 2001-06-05 2002-12-20 Dainippon Printing Co Ltd New account opening system using ic card
US7974416B2 (en) * 2002-11-27 2011-07-05 Intel Corporation Providing a secure execution mode in a pre-boot environment
JP2004348677A (en) * 2003-05-26 2004-12-09 Sony Corp Program and information processing method
JP2005227995A (en) * 2004-02-12 2005-08-25 Sony Corp Information processor, information processing method and computer program
US8667580B2 (en) * 2004-11-15 2014-03-04 Intel Corporation Secure boot scheme from external memory using internal memory
US20060179308A1 (en) * 2005-02-07 2006-08-10 Andrew Morgan System and method for providing a secure boot architecture
US8291226B2 (en) * 2006-02-10 2012-10-16 Qualcomm Incorporated Method and apparatus for securely booting from an external storage device
CN1822013A (en) * 2006-03-14 2006-08-23 上海一维科技有限公司 Finger print biological identifying engine system and its identifying method based on credible platform module
US7949863B2 (en) * 2006-03-30 2011-05-24 Silicon Image, Inc. Inter-port communication in a multi-port memory device
CN100504779C (en) * 2006-06-30 2009-06-24 联想(北京)有限公司 Method for accelerating BIOS operation
CN1900939A (en) * 2006-07-18 2007-01-24 上海一维科技有限公司 Finger print biological identification device and it identification method of safety computer
US8068614B2 (en) * 2007-09-28 2011-11-29 Intel Corporation Methods and apparatus for batch bound authentication
US8583908B2 (en) * 2007-12-31 2013-11-12 Intel Corporation Enhanced network and local boot of Unified Extensible Firmware Interface images
DE102008021567B4 (en) * 2008-04-30 2018-03-22 Globalfoundries Inc. Computer system with secure boot mechanism based on symmetric key encryption

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010007131A1 (en) * 1997-09-11 2001-07-05 Leonard J. Galasso Method for validating expansion roms using cryptography
US20050076226A1 (en) * 2003-10-01 2005-04-07 International Business Machines Corporation Computing device that securely runs authorized software
EP1659472A1 (en) * 2004-11-22 2006-05-24 Research In Motion Limited Method and Device for Authenticating Software

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9235710B2 (en) 2013-05-23 2016-01-12 Cisco Technology, Inc. Out of band management of basic input/output system secure boot variables
US9773115B2 (en) 2013-05-23 2017-09-26 Cisco Technology, Inc. Out of band management of basic input/output system secure boot variables
US11068597B2 (en) 2013-05-23 2021-07-20 Cisco Technology, Inc. Out of band management of basic input/output system secure boot variables
US11775651B2 (en) 2013-05-23 2023-10-03 Cisco Technology, Inc. Out of band management of basic input/output system secure boot variables
US11514167B2 (en) 2020-02-12 2022-11-29 Realtek Semiconductor Corporation Computer system having firmware verification mechanism and firmware verification method of the same

Also Published As

Publication number Publication date
US8656146B2 (en) 2014-02-18
CN101965570A (en) 2011-02-02
CN101965570B (en) 2013-09-18
DE102008011925B4 (en) 2018-03-15
TWI498768B (en) 2015-09-01
DE102008011925A1 (en) 2009-09-03
KR101237527B1 (en) 2013-02-26
JP2011527777A (en) 2011-11-04
EP2250599A1 (en) 2010-11-17
US20090222653A1 (en) 2009-09-03
KR20100125371A (en) 2010-11-30
TW200943123A (en) 2009-10-16

Similar Documents

Publication Publication Date Title
US8656146B2 (en) Computer system comprising a secure boot mechanism
US8464037B2 (en) Computer system comprising a secure boot mechanism on the basis of symmetric key encryption
US11089016B2 (en) Secure system on chip
JP5378460B2 (en) System and method for protected operating system boot using state verification
US9910991B2 (en) Event-based apparatus and method for securing bios in a trusted computing system during execution
US8006095B2 (en) Configurable signature for authenticating data or program code
US7139915B2 (en) Method and apparatus for authenticating an open system application to a portable IC device
US7010684B2 (en) Method and apparatus for authenticating an open system application to a portable IC device
TWI567580B (en) Method and system for preventing execution of malware
US9183394B2 (en) Secure BIOS tamper protection mechanism
EP2854066A1 (en) System and method for firmware integrity verification using multiple keys and OTP memory
EP2874091B1 (en) Partition-based apparatus and method for securing bios in a trusted computing system during execution
EP2874092B1 (en) Recurrent BIOS verification with embedded encrypted hash
US20040151319A1 (en) Method and apparatus for managing a hierarchy of nodes
JP4791250B2 (en) Microcomputer and its software falsification prevention method
EP3440586B1 (en) Method for write-protecting boot code if boot sequence integrity check fails
US7913074B2 (en) Securely launching encrypted operating systems

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 200980106728.X

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09716112

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 2009716112

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 5255/CHENP/2010

Country of ref document: IN

WWE Wipo information: entry into national phase

Ref document number: 2010548742

Country of ref document: JP

ENP Entry into the national phase

Ref document number: 20107021808

Country of ref document: KR

Kind code of ref document: A