How to Bypass Verified Boot Security in Chromium OS
Mohammad Iftekhar HusainLokesh MandvekarChunming QiaoRamalingam SridharPublished in: CoRR (2012)
Keyphrases
- windows xp
- security issues
- operating system
- security requirements
- intrusion detection
- information security
- access control
- network security
- security problems
- security policies
- security measures
- security systems
- statistical databases
- high security
- security mechanisms
- encryption scheme
- database
- open source
- authentication protocol
- virtual machine
- security management
- smart card
- mobile devices