I. Introduction
With increasing spread of rootkits and bootkits, the need for some form of system startup security has been widely acknowledged. The required immunity from software attacks necessitates a root of trust which is implemented in hardware and not modif able by software.