DocumentCode :
528480
Title :
Detection about vulnerabilities and malicious codes for legacy BIOS
Author :
Zhou, Zhenliu ; Luan, Haoli ; Li, Bo ; Zhu, Shidong
Author_Institution :
Dept. of Inf. Eng., Inst. of Eng., Shenyang, China
Volume :
1
fYear :
2010
fDate :
June 29 2010-July 1 2010
Firstpage :
77
Lastpage :
80
Abstract :
An implementation of legacy BIOS Trojan is demonstrated to attest that planting malicious codes into legacy BIOS, which can be executed during runtime of BIOS and OS, is feasible. Then vulnerabilities of legacy BIOS are analyzed. To detect above vulnerabilities and malicious codes in legacy BIOS, a security detection system for legacy BIOS is designed and implemented. This detection system can be applied to products such as Award and Phoenix BIOS.
Keywords :
computer network security; input-output programs; invasive software; software maintenance; legacy BIOS Trojan; malicious code; security detection system; vulnerability detection; Awards activities; Proposals; Trojan horses; Detection formatting; Legacy BIOS; Malicious Code; Vulnerability;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communication Systems, Networks and Applications (ICCSNA), 2010 Second International Conference on
Conference_Location :
Hong Kong
Print_ISBN :
978-1-4244-7475-2
Type :
conf
DOI :
10.1109/ICCSNA.2010.5588770
Filename :
5588770
Link To Document :
بازگشت