Proceedings of the 2013 ACM SIGSAC Conference on Computer &Amp; Communications Security - CCS '13 2013
DOI: 10.1145/2508859.2516714
|View full text |Cite
|
Sign up to set email alerts
|

BIOS chronomancy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(3 citation statements)
references
References 11 publications
0
1
0
Order By: Relevance
“…For example, malware could infiltrate the BIOS (Basic Input/Output System) or UEFI (Unified Extensible Firmware Interface), the firmware that initializes the system before running any software. This level of infection poses a grave threat, as malware can survive system reboots and even persist following OS reinstalls, thereby attaining low-level system access to potentially compromise the system further [18].…”
Section: A Secure Boot: Secure Architecturesmentioning
confidence: 99%
“…For example, malware could infiltrate the BIOS (Basic Input/Output System) or UEFI (Unified Extensible Firmware Interface), the firmware that initializes the system before running any software. This level of infection poses a grave threat, as malware can survive system reboots and even persist following OS reinstalls, thereby attaining low-level system access to potentially compromise the system further [18].…”
Section: A Secure Boot: Secure Architecturesmentioning
confidence: 99%
“…As an example, Kauer [2007] modify the BIOS by showing that by rebooting the system the Core Root of Trust for Measurement (CRTM) of the TPM can be changed without being noticed. [Butterworth et al 2013] also present a vulnerability that allows an attacker to take control of the BIOS update process and re-flash it with an arbitrary image despite the presence of signed enforcement. This class of rootkits has been called "Ring -2 rootkits" (level -1 being hypervisor rootkits).…”
Section: Existing Attacksmentioning
confidence: 99%
“…The UEFI operating system runs on top of the UEFI firmware and can usually be viewed as a tandem of a UEFI application, serving as an operating system bootloader and a UEFIcompatible kernel, which is aware of the features brought by the UEFI firmware via the UEFI specification. Alongside UEFI, alternative open-source projects such as coreboot [4], libreboot [5], linuxboot [6], and u-boot [6] offer different approaches and philosophies to firmware initialization, focusing on modularity, security, and the freedom to customize the boot process to specific needs and hardware configurations. HII (Human Interface Infrastructure) [7,8] is a part of the UEFI specification, which provides a standard framework for managing user interfaces based on UEFI systems.…”
Section: Introductionmentioning
confidence: 99%