期刊文献+

BIOS恶意代码实现及其检测系统设计 被引量:6

BIOS Malicious Code Implementation and Its Detection System Design
下载PDF
导出
摘要 根据基本输入输出系统(BIOS)恶意代码的植入方式,将其分为工业标准体系结构、高级配置和电源管理接口、外部设备互连模块恶意代码3类,分别对其实现过程进行研究。在此基础上,设计一种BIOS恶意代码检测系统,包括采样、模块分解、解压缩、恶意代码分析模块。应用结果表明,该系统能检测出BIOS镜像文件中植入的恶意代码,可有效增强BIOS的安全性。 Based on the implantation method of Basic Input Output System(BIOS) malicious code, this paper divides the malicious code into Industry Standard Architecture(ISA), Advanced Configuration and Power management Interface(ACPI) and Peripheral Component Interconnect (PCI) module malicious code, and analyzes the implementation processes of three types of BIOS malicious code. It designs a BIOS malicious code detection system which includes the modules of sampling, module disassembling, decompressing and malicious code analyzing. Application results show that this system can detect the malicious code in BIOS image file, and it can effectively enhance the security of BIOS.
出处 《计算机工程》 CAS CSCD 北大核心 2010年第21期17-18,21,共3页 Computer Engineering
基金 国家科技支撑计划基金资助重点项目(2009BAH52B06) 北京市自然科学基金资助面上项目(4072010)
关键词 基本输入输出系统 恶意代码 安全检测 Basic Input Output System(BIOS) malicious code security detection
  • 相关文献

参考文献6

  • 1周振柳,刘宝旭,池亚平,许榕生.计算机BIOS安全风险分析与检测系统研究[J].计算机工程,2007,33(16):114-116. 被引量:13
  • 2黄明,曾庆凯.软件脆弱性分类属性研究[J].计算机工程,2010,36(1):184-186. 被引量:9
  • 3Heasman J.Implementing and Detecting an ACPI BIOS Rootkit[EB/OL].(2006-03-11).https://www.blackhat.com/presen- tations/bh-federal-06/BH-Fed-06-Heasman.pdf.
  • 4Compaq,Phoenix,Intel.BIOS Boot Specification v1.01[EB/OL].(1996-05-13).http://www.phoenix.com/techs/specs.html.
  • 5Intel.Preboot Execution Environment Specification v2.1[EB/OL].(1999-07-26).http://download.intel.com/design/archives/wfm/down- loads/pxespec.pdf.
  • 6Christodorescu M,Jha S.Static Analysis of Executables to Detect Malicious Patterns[C]//Proc.of the 12th USENIX Security Symposium.Berkeley,USA: [s.n.],2003.

二级参考文献27

  • 1Piessens F. A Taxonomy of Causes of Software Vulnerabilities in Internet Software[C]//Proc. of the 13th International Symposium on Software Reliability Engineering. Annapolis, MD, USA: [s. n.], 2002.
  • 2Abbott R P, Chin J S, Donnelley J E, et al. Security Analysis and Enhancements of Computer Operating Systems[Z]. Washington, USA: Institute for Science Technology, National Bureau of Standards, 1976.
  • 3Carlstedt J, Bisbey R, Popek G. Pattern-directed Protection Evaluation[Z]. California, USA: Information Science Institute, University of Southern California, 1975.
  • 4Denning D E. Cryptography and Data Security[M]. Boston, USA: Addison-Wesley Longman Publishing Co., Inc., 1983.
  • 5Bishop M, Bailey D. A Critical Analysis of Vulnerability Taxonomies[Z]. California, USA: Department of Computer Science, University of California at Davis, 1996.
  • 6Krsul I. Software Vulnerability Analysis[D]. West Lafayette, USA: Department of Computer Science, Purdue University, 1998.
  • 7Bazaz A, Arthur J D. Towards a Taxonomy of Vulnerabilities[C]// Proc. of the 40th Annual Hawaii Intemational Conference on System Science. Hawaii, USA: [s. n.], 2007.
  • 8Aslam T. A Taxonomy of Security Faults in the Unix Operating System[D]. West Lafayette, USA: Department of Computer Science, Purdue University, 1995.
  • 9Cohen F B. Information System Attacks: A Preliminary Classification Scheme[J]. Computers and Security, 1997, 16(1): 26-49.
  • 10Krsul I, Spafford E, Tripunitara M. Computer Vulnerability Analysis[D]. West LaIhyette, USA: Department of Computer Sciences, Purdue University, 1997.

共引文献20

同被引文献36

  • 1孙勇,杨义先.基于BIOS和USB盘实现对PC机的安全访问[J].计算机应用研究,2006,23(5):113-114. 被引量:4
  • 2沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:359
  • 3谢勇,来学嘉,邓子健.EFI及其安全性研究[J].信息安全与通信保密,2007,29(8):175-177. 被引量:2
  • 4王爽.汇编语言[M].2版.北京:清华大学出版社,2008.
  • 5周振柳,刘宝旭,池亚平,许榕生.计算机BIOS安全风险分析与检测系统研究[J].计算机工程,2007,33(16):114-116. 被引量:13
  • 6UEFI specifications[EB/OL].http://www.uefi.org/specs.
  • 7Zhou Zhenliu,Fan Jiapeng,Zhang Nan,et al.Advance and development of computer firmware security research[C]//Proceedings of the2009International Symposium on Information Processing,China,2009:258-262.
  • 8King S T,Tucek J,Cozzie A,et al.Designing and implementing malicious hardware[C]//Proceedings of the1st USENIX Workshop on Large-Scale Exploits and Emer-gent Threats,US,2008:1-8.
  • 9Heasman J.Hacking the extensible firmware interface[Z].2007.
  • 10张翠艳,张平,胡刚.基于硬件资源访问控制的固件恶意行为研究[J].计算机工程应用研究,2011,28(7):2709-2714.

引证文献6

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部