Entry Gotzfried:2014:MAT from tissec.bib

Last update: Sun Oct 15 02:58:48 MDT 2017                Valid HTML 3.2!

Index sections

Top | Symbols | Numbers | Math | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

BibTeX entry

@Article{Gotzfried:2014:MAT,
  author =       "Johannes G{\"o}tzfried and Tilo M{\"u}ller",
  title =        "Mutual Authentication and Trust Bootstrapping towards
                 Secure Disk Encryption",
  journal =      j-TISSEC,
  volume =       "17",
  number =       "2",
  pages =        "6:1--6:??",
  month =        nov,
  year =         "2014",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/2663348",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Wed Nov 19 12:26:42 MST 2014",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "The weakest link in software-based full disk
                 encryption is the authentication procedure. Since the
                 master boot record must be present unencrypted in order
                 to launch the decryption of remaining system parts, it
                 can easily be manipulated and infiltrated by bootkits
                 that perform keystroke logging; consequently,
                 password-based authentication schemes become
                 attackable. The current technological response, as
                 enforced by BitLocker, verifies the integrity of the
                 boot process by use of the trusted platform module.
                 But, as we show, this countermeasure is insufficient in
                 practice. We present STARK, the first tamperproof
                 authentication scheme that mutually authenticates the
                 computer and the user in order to resist keylogging
                 during boot. To achieve this, STARK implements trust
                 bootstrapping from a secure token to the whole PC. The
                 secure token is an active USB drive that verifies the
                 integrity of the PC and indicates the verification
                 status by an LED to the user. This way, users can
                 ensure the authenticity of the PC before entering their
                 passwords.",
  acknowledgement = ack-nhfb,
  articleno =    "6",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

Related entries