Visible to the public UEFI Trusted Computing Vulnerability Analysis Based on State Transition Graph

TitleUEFI Trusted Computing Vulnerability Analysis Based on State Transition Graph
Publication TypeConference Paper
Year of Publication2020
AuthorsGu, Yanyang, Zhang, Ping, Chen, Zhifeng, Cao, Fei
Conference Name2020 IEEE 6th International Conference on Computer and Communications (ICCC)
KeywordsAnalytical models, Bayes methods, Bayesian networks, composability, Computational modeling, Computing Theory, Computing Theory and Trust, human factors, Microprogramming, network theory (graphs), pagerank, pubcrawl, Resiliency, security, state transition graph, Trust, Trusted Computing, UEFI
AbstractIn the face of increasingly serious firmware attacks, it is of great significance to analyze the vulnerability security of UEFI. This paper first introduces the commonly used trusted authentication mechanisms of UEFI. Then, aiming at the loopholes in the process of UEFI trust verification in the startup phase, combined with the state transition diagram, PageRank algorithm and Bayesian network theory, the analysis model of UEFI trust verification startup vulnerability is constructed. And according to the example to verify the analysis. Through the verification and analysis of the data obtained, the vulnerable attack paths and key vulnerable nodes are found. Finally, according to the analysis results, security enhancement measures for UEFI are proposed.
DOI10.1109/ICCC51575.2020.9345103
Citation Keygu_uefi_2020