Secure Boot Attacks and Defenses
Platform Key Provisioning
Initial Database Population
Hardware Security Implementation
Customer Key Management Support
Bootloader Signing
Key Distribution
Update Mechanisms
Revocation Procedures
Microsoft UEFI CA
Third-Party Certificate Authorities
Community-Based Authorities
Cross-Certification Relationships
Key Generation Procedures
Key Distribution Methods
Key Storage Security
Key Rotation Policies
Key Revocation Processes
Database Enrollment Procedures
Database Update Mechanisms
Database Synchronization
Database Backup and Recovery
User-Controlled Keys
Custom Mode Operations
Alternative Operating System Support
Self-Signed Certificate Management
Previous
3. The Secure Boot Process
Go to top
Next
5. Attack Vectors and Threat Analysis