Secure Boot Attacks and Defenses
Hardware Power-On Self-Test
Firmware Initialization
Security Processor Activation
Platform Configuration Setup
UEFI Driver Verification
Option ROM Authentication
Boot Service Driver Loading
Runtime Driver Validation
Boot Option Enumeration
Boot Device Selection
Boot Path Validation
Boot Manager Authentication
Signature Verification Process
Certificate Chain Validation
Database Lookup Procedures
Revocation List Checking
Kernel Authentication
Boot Parameter Validation
Control Transfer Mechanisms
Runtime Service Transition
Authentication Failure Responses
Error Reporting Mechanisms
Recovery Mode Options
Fallback Procedures
Previous
2. UEFI Secure Boot Architecture
Go to top
Next
4. Key Management and Certificate Infrastructure