DocumentCode
528480
Title
Detection about vulnerabilities and malicious codes for legacy BIOS
Author
Zhou, Zhenliu ; Luan, Haoli ; Li, Bo ; Zhu, Shidong
Author_Institution
Dept. of Inf. Eng., Inst. of Eng., Shenyang, China
Volume
1
fYear
2010
fDate
June 29 2010-July 1 2010
Firstpage
77
Lastpage
80
Abstract
An implementation of legacy BIOS Trojan is demonstrated to attest that planting malicious codes into legacy BIOS, which can be executed during runtime of BIOS and OS, is feasible. Then vulnerabilities of legacy BIOS are analyzed. To detect above vulnerabilities and malicious codes in legacy BIOS, a security detection system for legacy BIOS is designed and implemented. This detection system can be applied to products such as Award and Phoenix BIOS.
Keywords
computer network security; input-output programs; invasive software; software maintenance; legacy BIOS Trojan; malicious code; security detection system; vulnerability detection; Awards activities; Proposals; Trojan horses; Detection formatting; Legacy BIOS; Malicious Code; Vulnerability;
fLanguage
English
Publisher
ieee
Conference_Titel
Communication Systems, Networks and Applications (ICCSNA), 2010 Second International Conference on
Conference_Location
Hong Kong
Print_ISBN
978-1-4244-7475-2
Type
conf
DOI
10.1109/ICCSNA.2010.5588770
Filename
5588770
Link To Document