2020 Ivannikov Ispras Open Conference (ISPRAS) 2020
DOI: 10.1109/ispras51486.2020.00010
|View full text |Cite
|
Sign up to set email alerts
|

Securing the EDK II Image Loader

Abstract: The Unified Extensible Firmware Interface (UEFI) is a standardised interface between the firmware and the operating system used in all x86-based platforms over the past ten years, which continues to spread to other architectures such as ARM and RISC-V. The UEFI incorporates a modular design based on images containing a driver or an application in a Common Object File Format (COFF) either as a Portable Executable (PE) or as a Terse Executable (TE). The de-facto standard generic UEFI services implementation, inc… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 7 publications
(13 reference statements)
0
3
0
Order By: Relevance
“…• the use of modern development tools for mission-critical software such as formal verification (PE loader [28]), fuzzing (parser of firmware configuration files), and static analysis (Svace [31]); • the support for booting both Windows (from 7 to 10) and Linux operating systems, with the ability to bypass the GRUB boot loader for the latter, on x86 and x86 64; • utility code to create firmware configuration files on all major desktop operating systems. The proposed set of tools of the Amaranth project allows one to substantially reduce the following threats:…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…• the use of modern development tools for mission-critical software such as formal verification (PE loader [28]), fuzzing (parser of firmware configuration files), and static analysis (Svace [31]); • the support for booting both Windows (from 7 to 10) and Linux operating systems, with the ability to bypass the GRUB boot loader for the latter, on x86 and x86 64; • utility code to create firmware configuration files on all major desktop operating systems. The proposed set of tools of the Amaranth project allows one to substantially reduce the following threats:…”
Section: Discussionmentioning
confidence: 99%
“…Obviously, all modern development tools for mission-critical software should always be used during the development of such a product. We performed formal verification of the PE loader with the AstraVer toolset [28], fuzzed critical parsing code parts, such as firmware configuration handling code, and ran static analysis with Svace [31]. To further reduce the risks of bugs residing in the codebase without our knowledge we created a hardened operating environment with the support for memory protection, stack canaries, stack overflow guards, and automatic variable initialisation.…”
Section: Hardening Firmware For Virtual Machinesmentioning
confidence: 99%
See 1 more Smart Citation