Title :
Detection about vulnerabilities and malicious codes for legacy BIOS
Author :
Zhou, Zhenliu ; Luan, Haoli ; Li, Bo ; Zhu, Shidong
Author_Institution :
Dept. of Inf. Eng., Inst. of Eng., Shenyang, China
fDate :
June 29 2010-July 1 2010
Abstract :
An implementation of legacy BIOS Trojan is demonstrated to attest that planting malicious codes into legacy BIOS, which can be executed during runtime of BIOS and OS, is feasible. Then vulnerabilities of legacy BIOS are analyzed. To detect above vulnerabilities and malicious codes in legacy BIOS, a security detection system for legacy BIOS is designed and implemented. This detection system can be applied to products such as Award and Phoenix BIOS.
Keywords :
computer network security; input-output programs; invasive software; software maintenance; legacy BIOS Trojan; malicious code; security detection system; vulnerability detection; Awards activities; Proposals; Trojan horses; Detection formatting; Legacy BIOS; Malicious Code; Vulnerability;
Conference_Titel :
Communication Systems, Networks and Applications (ICCSNA), 2010 Second International Conference on
Conference_Location :
Hong Kong
Print_ISBN :
978-1-4244-7475-2
DOI :
10.1109/ICCSNA.2010.5588770