期刊文献+

BIOS陷门实现机理及检测技术研究 被引量:1

Research on implementation mechanism and detection technique of BIOS trapdoor
下载PDF
导出
摘要 基本输入输出系统(BIOS)陷门对计算机系统影响巨大,且现有工具难以有效检测其存在。在逆向分析基础上,研究了BIOS结构及BIOS代码混淆技术。根据实现粒度,将BIOS陷门分为模块级BIOS陷门与指令级BIOS陷门,详细分析了这两类陷门的实现原理与特点。最后提出了基于模块构成分析的模块级陷门检测方法和基于完整性度量的指令级陷门检测方法。实验结果表明,两种方法能有效检测与之对应的BIOS陷门的存在。 Basic Input Output System (BIOS) trapdoor has huge impact on computer system, and it is difficult to detect the existence of BIOS trapdoor effectively with the existing tools. After researching BIOS structure and BIOS code obfuscation technique based on reverse analysis, BIOS trapdoors were divided into module-level BIOS trapdoor and instruction-level BIOS trapdoor according to implementation granularity, followed by analyzing the implementation principle and characteristics of these two BIOS trapdoors in detail. Finally the detection method of module-level trapdoor based on analyzing module structure and the detection method of instruction-level trapdoor based on integrity measurement were presented. The experimental results show that these two methods can detect the existence of their corresponding BIOS trapdoors effectively.
机构地区 信息工程大学
出处 《计算机应用》 CSCD 北大核心 2013年第2期455-459,共5页 journal of Computer Applications
基金 信息工程大学未来发展基金资助项目(1201)
关键词 BIOS陷门 逆向分析 代码混淆 模块级陷门 指令级陷门 陷门检测 BIOS trapdoor reverse analysis code obfuscation module-level trapdoor instruction-level trapdoor trapdoor detection
  • 相关文献

参考文献12

  • 1沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:359
  • 2ZIMMER V, ROTHMAN M, HALE R. Beyond BIOS: implemen- ting the unified extensible firmware interface with lntel's framework [ M]. [ S. 1. ] : Intel Press, 2006:2 -9.
  • 3池亚平,许盛伟,方勇.BIOS木马机理分析与防护[J].计算机工程,2011,37(13):122-124. 被引量:7
  • 4HEASMAN J. Implementing and detecting an ACPI BIOS rootkit [ EB/OL]. [ 2012 - 07 - 10]. http://www, blackhat, com/presen- tations/bh-europe-06/bh-eu -06 - Heasman. pdf.
  • 5HEASMAN J. Implementing and detecting a PCI rootkit [ EB/OL]. [2012 -07 - 10]. http://www, blackhat, com/presentations/bh- dc-07/Heasman/Paper/bh-dc-07-Heasman-WP, pdf.
  • 6ORTEGA A, SACCO A. Persistent BIOS infection I EB/OL]. [2012 -07 - 10]. http://www, coresecurity, concontent/Persistent-Bios- Infection.
  • 7KASPERSKYK.She|lcoder编程揭秘[M].罗爱国,郑艳杰,译.北京:电子工业出版社,2006:348-376.
  • 8王爽.汇编语言[M].2版.北京:清华大学出版社,2008.
  • 9周振柳,刘宝旭,池亚平,许榕生.计算机BIOS安全风险分析与检测系统研究[J].计算机工程,2007,33(16):114-116. 被引量:13
  • 10王晓箴,刘宝旭,潘林.BIOS恶意代码实现及其检测系统设计[J].计算机工程,2010,36(21):17-18. 被引量:6

二级参考文献25

共引文献383

同被引文献5

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部