期刊文献+

基于UEFI固件的BOOTKIT检测技术研究

BOOTKIT Detection Based on UEFI
下载PDF
导出
摘要 基于UFEI的BOOTKIT攻击能对UFEI固件、操作系统的完整性进行破坏,严重影响计算机安全。基于此,该文提出一种新的基于UEFI固件的BOOTKIT检测方法UDS,来保护固件和操作系统的安全。UDS以UEFI虚拟设备驱动程序的形式实现,在OS之前加载启动;采用了将完整性检测与文件恢复相结合的策略,对固件和操作系统内核进行保护;并通过代码混淆和文件隐藏的方法,防止UDS自身被BOOTKIT攻击。实验表明,UDS能有效保护固件和OS的完整性,防范基于UEFI的BOOTKIT攻击,具有启动时间早、空间开销少及自我保护性好的优点。 UEFI-based BOOTKIT compromise the integrity of both UEFI firmware and OS,posing a fatal threat on the security of computer.In response,a new bootkit defense system based on UEFI,named UDS,is proposed in this paper.The proposed UDS is implemented as a UEFI device driver,which is booted before the OS.By adopting a strategy that combines integrity checking and file restoring,UDS protects firmware and OS kernels.And the methods of code obfuscation and file hiding are introduced to prevent UDS itself from being attacked by BOOTKIT.Finally,several experiments had been conducted to prove that UDS can protect itself from the attack of BOOTKIT,while effectively protecting integrity of both OS and firmware.
作者 刘文祺 范明钰 田伟 王光卫 LIU Wen-qi;FAN Ming-yu;TIAN Wei;WANG Guang-wei(School of Computer Science and Engineering,University of Electronic Science and Technology of China Chengdu 611731;The 95333 troop of People’s Liberation Army of China Changsha 410114)
出处 《电子科技大学学报》 EI CAS CSCD 北大核心 2018年第6期901-905,共5页 Journal of University of Electronic Science and Technology of China
基金 国家自然科学基金(60373109 60272091)
关键词 BOOTKIT 文件恢复 完整性检测 自我保护 统一可扩展固件接口 BOOTKIT file recovery integrity checking self-protection UEFI
  • 相关文献

参考文献1

二级参考文献8

  • 1Heasman J.Implementing and Detecting an ACPI BIOSRootkit[C]//Proc.of BLACKHAT’06.Washington D.C.,USA:[s.n.],2006.
  • 2Heasman J.Implementing and Detecting an PCI Rootkit[C]//Proc.of BLACKHAT’07.Washington D.C.,USA:[s.n.],2007.
  • 3Wojtczuk R,Rutkowska J.Attacking Intel Trusted ExecutionTechnology[C]//Proc.of BLACKHAT’09.Washington D.C.,USA:[s.n.],2007.
  • 4The Unified EFI Forum.Unified Extensible Firmware InterfaceSpecification Version 2.3.1[EB/OL].(2011-04-08).http://www.uefi.org.
  • 5Trusted Computing Group.TCG PC Specific ImplementationSpecification Version 1.1[EB/OL].(2003-08-04).http://www.trustedcomputing.org.
  • 6Zimmer V J.Platform Trust Beyond BIOS Using the UnifiedExtensible Firmware Interface[C]//Proc.of SAM’07.Las Vegas,USA:[s.n.],2007.
  • 7Zhou Zhenliu,Xu Rongsheng.BIOS Security Analysis and a Kindof Trusted BIOS[C]//Proc.of the 9th International Conference onInformation and Communications Security.Zhengzhou,China:[s.n.],2007:427-437.
  • 8Aho A V,Corasiek M J.Efficient String Matching:An Aid toBibliographic Search[J].Communications of the ACM,1975,18(6):333-343.

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部