[OpenBIOS] Secure BIOS for voting?

Lennart Sorensen lsorense at csclub.uwaterloo.ca
Tue Jul 23 23:08:28 CEST 2013


On Tue, Jul 23, 2013 at 04:28:23PM -0400, Tarl Neustaedter wrote:
> The problem of secure execution is fairly well understood. Google
> "Verified Boot" or "Trusted Boot". The implementations that take it
> seriously do verification of their PROM, sign it, and the hardware
> won't let you start unless the PROM is good. Then the PROM verifies
> the signature of each component as it's brought in (I was recently
> involved in implementing public key verification for such).
> 
> It doesn't guarantee bug-free code, but it verifies that the code
> you are running is what you think it is.

And the PROM is inside the CPU so you can't swap it in some cases,
perhaps even encrypted.

-- 
Len Sorensen



More information about the OpenBIOS mailing list