Back to Results
First PageMeta Content
Computing / Unified Extensible Firmware Interface / Unified EFI Forum / Rootkit / Windows 8 / Booting / TrueCrypt / Disk encryption / Trusted Platform Module / BIOS / System software / Software


UEFI SECURE BOOT IN MODERN COMPUTER SECURITY SOLUTIONS September[removed]Authors:
Add to Reading List

Document Date: 2013-09-23 19:43:48


Open Document

File Size: 435,74 KB

Share Result on Facebook

City

Kuala Lumpur / /

Company

IBM / T. C. Group / Brian Richardson Intel Corporation / Phoenix Technologies / Intel Corporation / Broadcom / Las Vegas NV / Ph.D. Phoenix Technologies Ltd. / UEFI Secure Boot / Houston Law Review / Microsoft / Trusted Computing Group / Apple / /

Country

Luxembourg / /

/

Event

FDA Phase / /

Facility

National Institute of Standards and Technology / National Institute / /

IndustryTerm

laptop systems / software vendors / system firmware technology / technology industry / overall security solution / disk encryption systems / important cross-functional solution / server systems / legacy operating systems / system bootloader software / computer software developers / external server / software/hardware tools / server-class systems / technology / anti-malware software / mobile devices / security tools / computer manufacturers / typical personal computer systems / /

OperatingSystem

Mac OS X / Linux / Integrity / Microsoft Windows / /

Organization

National Institute for Science and Technology / United States Government / National Institute of Standards and Technology / UEFI Forum / Certificate Authority / Department of Commerce / Center for Strategic and International Studies / /

Person

Andrew Furtak / Oleksandr Bazhaniuk / Richard Wilkins / Yuriy Bulygin / /

Position

maid / Private / /

Product

Secure Boot / Specification Version 2.2 / Specification 2.2 / in / /

ProvinceOrState

California / /

PublishedMedium

the Intel Technology Journal / /

Technology

Linux system / Linux / Virtual Machine technology / private key / operating system / 64-bit processor / operating systems / TPM chip / Mobile Devices / encryption / system firmware technology / Itaniumâ„¢ processor / public key / platform technologies / DOM / antivirus software / digital signature / /

URL

www.sans.org/reading_room/whitepapers/services/analysis-building-blocks-attack-vectorsunified-extensible-firmware_34215 / http /

SocialTag