{"title":"使用虚拟硬盘的安全固件架构","authors":"J. Sim, Jungchan Na","doi":"10.1109/ISIAS.2014.7064622","DOIUrl":null,"url":null,"abstract":"Recently, smart devices have rapidly become ubiquitous; however, vulnerability attacks that target the devices' firmware have increased apace. Despite efforts to defend against such attacks, embedded devices have not been applied because the devices have restricted resources. In this paper, we describe an architecture that can rapidly verify integrity and enables delta updates that only include the data modifications of the original data using virtual hard disks.","PeriodicalId":146781,"journal":{"name":"2014 10th International Conference on Information Assurance and Security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secure firmware architecture using virtual hard disks\",\"authors\":\"J. Sim, Jungchan Na\",\"doi\":\"10.1109/ISIAS.2014.7064622\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recently, smart devices have rapidly become ubiquitous; however, vulnerability attacks that target the devices' firmware have increased apace. Despite efforts to defend against such attacks, embedded devices have not been applied because the devices have restricted resources. In this paper, we describe an architecture that can rapidly verify integrity and enables delta updates that only include the data modifications of the original data using virtual hard disks.\",\"PeriodicalId\":146781,\"journal\":{\"name\":\"2014 10th International Conference on Information Assurance and Security\",\"volume\":\"23 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 10th International Conference on Information Assurance and Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISIAS.2014.7064622\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 10th International Conference on Information Assurance and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISIAS.2014.7064622","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secure firmware architecture using virtual hard disks
Recently, smart devices have rapidly become ubiquitous; however, vulnerability attacks that target the devices' firmware have increased apace. Despite efforts to defend against such attacks, embedded devices have not been applied because the devices have restricted resources. In this paper, we describe an architecture that can rapidly verify integrity and enables delta updates that only include the data modifications of the original data using virtual hard disks.