18th Annual Computer Security Applications Conference, 2002. Proceedings.
DOI: 10.1109/csac.2002.1176312
|View full text |Cite
|
Sign up to set email alerts
|

Malicious code detection for open firmware

Abstract: Malicious boot firmware is a largely unrecognized but significant security risk to our global information infrastructure. Since boot firmware executes before the operating system is loaded, it can easily circumvent any operating system-based security mechanism. Boot firmware programs are typically written by third-party device manufacturers and may come from various suppliers of unknown origin. In this paper we describe an approach to this problem based on load-time verification of onboard device drivers again… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(12 citation statements)
references
References 18 publications
0
11
0
Order By: Relevance
“…Firmware is typically provided by the supplier; however, these files are modifiable as well. The firmware can be validated before it is loaded using an error checking routine [3,8]. For firmware that is already loaded on a PLC, however, there is no current method to extract the firmware in ROM and validate that it has not been modified, making firmware modifications subversive [8].…”
Section: Discussion Of Effectsmentioning
confidence: 99%
See 1 more Smart Citation
“…Firmware is typically provided by the supplier; however, these files are modifiable as well. The firmware can be validated before it is loaded using an error checking routine [3,8]. For firmware that is already loaded on a PLC, however, there is no current method to extract the firmware in ROM and validate that it has not been modified, making firmware modifications subversive [8].…”
Section: Discussion Of Effectsmentioning
confidence: 99%
“…The PLC may be loaded using proprietary software or a driver, which is an input to the computer. Inputs could also include the Internet if the computer downloads updates, external media such as a USB, or any device that connects to the computer [3,4].…”
Section: Trust Evaluationmentioning
confidence: 99%
“…Another approach to mitigate the spread of such infections would be to use reliable bootstrap architectures [24], malicious code detectors [25], or automated firmware security upgrades. A new direction of research is heading towards identifying new threat models and malware behavior in WiFi networks.…”
Section: Countermeasures and Related Workmentioning
confidence: 99%
“…Schneider proved that the class of properties that can be enforced by a reference monitor (inlined or otherwise) is restricted to safety properties 1 and that any enforceable safety property could, at least in principle, be enforced by an execution monitor [46].…”
Section: Inlined Reference Monitorsmentioning
confidence: 99%