The Integrity Measurement Architecture
The Integrity Measurement Architecture
Posted May 28, 2005 19:03 UTC (Sat) by Ross (guest, #4065)In reply to: The Integrity Measurement Architecture by jamesm
Parent article: The Integrity Measurement Architecture
Presumably you would just lie to the hardware that does the checksums. It
has no way to verify what you tell it is valid and will end up signing bad
data. Normally this wouldn't be possible because untrusted code isn't
allowed to run, and even if it did, it would corrupt the secret state
information. All bets are off when the untrusted code is in charge from the
start. But maybe I misunderstand.