期刊文献+

BIOS Rootkit的实现技术 被引量:1

Realization of BIOS Rootkit Technology
下载PDF
导出
摘要 现在BIOS芯片被恶意刷写进BIOS Rootkit的可能性越来越大。本文对BIOS Rootkit的基本概念、组成模块和危害特性进行阐述,同时详细介绍BIOS Rootkit的实现技术,并建议尽快建立相应的安全标准,以避免或减少BIOS Rootkit的攻击。 Nowadays, BIOS chips being brushed into BIOS Rootkit maliciously is increasingly likely. In this paper, the basic concepts, building blocks and the hazardous properties of the BIOS Rootkit are expounded and the realization of BIOS Rootkit technology is described in detail, at the same time, establishing appropriate safety standards as soon as possible is recommended to avoid or minimize the BIOS Rootkit attack.
出处 《计算机与现代化》 2013年第11期174-176,181,共4页 Computer and Modernization
关键词 芯片 BIOS ROOTKIT 实现技术 安全 chips BIOS Rootkit realization of technology security
  • 相关文献

参考文献3

二级参考文献8

  • 1David O'Brien.lgecognizing and recovering from Igootkit attacks [J]. Sys Admin, 1996, 5(11):8-20.
  • 2John Heasman. Rootkit threats [d]. Network Security, 2006, 2006(1): 18-19.
  • 3J. Butler, S. Sparks. Shadow Walker: Raising the bar for Windows R, ootkit detection [J]. Phrack Magazine, 2005, 11(63):8.
  • 4Holy Father. Hooking Windows API -- Technics of hooking API functions on Windows [J]. The Assembly-Programming-Journal, 2004, 2(2): 2--30.
  • 5Compaq,Phoenix,Intel.BIOS Boot Specification v1.01[Z].(1996-10).http://www.phoenix.com/NR/rdonlyres/56E38DE2-3E6F-4743-835F-B4A53726ABED/0/specsbbs101.pdf.
  • 6Einarsson S,Rausand M.An Approach to Vulnerability Analysis of Complex Industrial Systems[J].Risk Analysis,1998,18(5):535-546.
  • 7TCG.TCG Specification Architecture Overview v1.2[Z].(2004-08).http://www.trustedcomputinggroup.org/groups/TCG_1_0_Architectu-re_Overview.pdf.
  • 8杨柳.计算机安全:封堵BIOS漏洞[J].瞭望,2004(19):52-53. 被引量:3

共引文献15

同被引文献11

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部