Featured Research

from universities, journals, and other organizations

Build safety into the very beginning of the computer system

Date:
May 11, 2011
Source:
National Institute of Standards and Technology (NIST)
Summary:
A new publication provides guidelines to secure the earliest stages of the computer boot process, the so-called BIOS (Basic Input/Output System) that initializes the computer hardware when you switch on the machine.

A new publication from the National Institute of Standards and Technology (NIST) provides guidelines to secure the earliest stages of the computer boot process. Commonly known as the Basic Input/Output System (BIOS), this fundamental system firmware -- computer code built into hardware -- initializes the hardware when you switch on the computer before starting the operating system. BIOS security is a new area of focus for NIST computer security scientists.

Related Articles


"By building security into the firmware, you establish the foundation for a secure system," said Andrew Regenscheid, one of the authors of BIOS Protection Guidelines (NIST Special Publication 800-147). Without appropriate protections, attackers could disable systems or hide malicious software by modifying the BIOS. This guide is focused on reducing the risk of unauthorized changes to the BIOS.

Designed to assist computer manufacturers writing BIOS code, SP 800-147 provides guidelines for building features into the BIOS that help protect it from being modified or corrupted by attackers. Manufacturers routinely update system firmware to fix bugs, patch vulnerabilities and support new hardware. SP 800-147 calls for using cryptographic "digital signatures" to authenticate the BIOS updates before installation based on NIST's current cryptographic guidelines. The publication is available just as computer manufacturers are beginning to deploy a new generation of BIOS firmware. "We believe computer manufacturers are ready to implement these guidelines and we hope to see them in products soon," said Regenscheid.

The publication also suggests management best practices that are tightly coupled with the security guidelines for manufacturers. These practices will help computer administrators take advantage of the BIOS protection features as they become available.

BIOS Protection Guidelines, NIST SP 800-147, is available at http://csrc.nist.gov/publications/nistpubs/800-147/NIST-SP800-147-April2011.pdf.


Story Source:

The above story is based on materials provided by National Institute of Standards and Technology (NIST). Note: Materials may be edited for content and length.


Cite This Page:

National Institute of Standards and Technology (NIST). "Build safety into the very beginning of the computer system." ScienceDaily. ScienceDaily, 11 May 2011. <www.sciencedaily.com/releases/2011/05/110511162533.htm>.
National Institute of Standards and Technology (NIST). (2011, May 11). Build safety into the very beginning of the computer system. ScienceDaily. Retrieved January 27, 2015 from www.sciencedaily.com/releases/2011/05/110511162533.htm
National Institute of Standards and Technology (NIST). "Build safety into the very beginning of the computer system." ScienceDaily. www.sciencedaily.com/releases/2011/05/110511162533.htm (accessed January 27, 2015).

Share This


More From ScienceDaily



More Computers & Math News

Tuesday, January 27, 2015

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

PlayStation Now Smart TV App

PlayStation Now Smart TV App

Rumble (Jan. 27, 2015) PlayStation Now Smart TV app is coming soon and will be available on both Sony and Samsung HDTV, allowing you to play games without even a counsel! Check out the video for more info. Credit to &apos;booredatwork&apos;. Video provided by Rumble
Powered by NewsLook.com
WikiLeaks Accuses Google of Handing Over Emails to US

WikiLeaks Accuses Google of Handing Over Emails to US

AFP (Jan. 27, 2015) Whistleblowing site WikiLeaks accused Google of handing over the emails and electronic data of its senior staff to the US authorities without providing notification until almost three years later. Duration: 01:09 Video provided by AFP
Powered by NewsLook.com
Shark Bite Victim Making Amazing Recovery

Shark Bite Victim Making Amazing Recovery

AP (Jan. 27, 2015) A Texas woman who lost more than five pounds of flesh to a shark in the Bahamas earlier this month could be released from a Florida hospital soon. Experts believe she was bitten by a bull shark while snorkeling. (Jan. 27) Video provided by AP
Powered by NewsLook.com
Cablevision Enters Wi-Fi Phone Fray

Cablevision Enters Wi-Fi Phone Fray

Reuters - Business Video Online (Jan. 26, 2015) The entry by Cablevision and Google could intensify the already heated price wars for mobile phone service. Fred Katayama reports. Video provided by Reuters
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:

Breaking News:

Strange & Offbeat Stories


Space & Time

Matter & Energy

Computers & Math

In Other News

... from NewsDaily.com

Science News

Health News

Environment News

Technology News



Save/Print:
Share:

Free Subscriptions


Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

Get Social & Mobile


Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

Have Feedback?


Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
Mobile: iPhone Android Web
Follow: Facebook Twitter Google+
Subscribe: RSS Feeds Email Newsletters
Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins