SoK: Security Below the OS - A Security Analysis of UEFI.
Priyanka Prakash SurveOleg BrodtMark YampolskiyYuval EloviciAsaf ShabtaiPublished in: CoRR (2023)
Keyphrases
- security analysis
- security requirements
- high security
- security properties
- security model
- internet banking
- mutual authentication
- authentication protocol
- encryption scheme
- public key
- smart card
- key exchange
- elliptic curve cryptography
- image encryption
- information security
- operating system
- user authentication
- security policies
- encryption algorithm
- private key
- secure electronic
- access control policies
- security mechanisms