Secure Boot Attacks and Defenses
PK Role and Authority
PK Enrollment Process
PK Revocation Procedures
PK Storage and Protection
KEK Purpose and Function
KEK Database Management
KEK Update Mechanisms
Multiple KEK Support
Allowed Signature Database (db)
Forbidden Signature Database (dbx)
Database Update Procedures
Database Synchronization
Variable Authentication Mechanisms
Secure Variable Storage
Variable Access Control
Variable Update Protocols
Digital Signature Algorithms
Hash Functions Used
Certificate Chain Validation
Public Key Infrastructure Integration
Previous
1. Fundamentals of Secure Boot
Go to top
Next
3. The Secure Boot Process