Akademska digitalna zbirka SLovenije - logo
E-viri
Celotno besedilo
  • The Analysis of Security We...
    Jiang Yi-ming; Liu Sheng-li

    2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing, 2010-April, Letnik: 1
    Conference Proceeding

    BitLocker technology uses Trusted Platform Module (TPM) to build the trust chain of system booting to protect the integrity of the system components from destruction. This technology can prevent the attacker from tampering the system boot files by Boot kit. This paper expounds how to achieve the boot protection by BitLocker technology, analyzes the potential security weaknesses of this technology, and puts forward some measures to improve its security.