Investigation on Vulnerabilities of Preboot and Post-boot Authentication

PDF

Authors
  1. Liu, X.
  2. Wang, L.
Corporate Authors
Defence R&D Canada - Ottawa, Ottawa ONT (CAN);Waterloo Univ, Waterloo ONT (CAN) Dept of Applied Mathematics
Abstract
This proposal provides an assessment and clear understanding of pre-boot and post-boot authentication for the future development of biometric authentication system in high security applications. We first give a technology review of current PC boot process, present a brief summary of mainly existing boot techniques and analyze the advantages and disadvantages of pre-boot and post-boot strategies. A brief summary of pre-boot and post-boot processes is then given, which presents the comparisons among different technologies. Next, we give an insight view of authentication technologies for pre-boot and post-boot stages respectively, with a particular focus on new biometric techniques. The security differences between pre-boot and post-boot authentication are studied and a comparison among different strategies is presented. Based on the disadvantages and limitations of current authentication techniques, several alternative authentication solutions are proposed, especially for the wireless devices in ad hoc networks.

Il y a un résumé en français ici.

Report Number
DRDC-OTTAWA-CR-2006-083 — Contractor Report
Date of publication
01 Jul 2006
Number of Pages
112
DSTKIM No
CA027904
CANDIS No
525778
Format(s):
CD ROM

Permanent link

Document 1 of 1

Date modified: