Mutual Authentication and Trust Bootstrapping towards Secure Disk Encryption


The weakest link in software-based full disk encryption is the authentication procedure. Since the master boot record must be present unencrypted in order to launch the decryption of remaining system parts, it can easily be manipulated and infiltrated by bootkits that perform keystroke logging; consequently, password-based authentication schemes become… (More)
DOI: 10.1145/2663348

4 Figures and Tables


  • Presentations referencing similar topics