• DocumentCode
    528480
  • Title

    Detection about vulnerabilities and malicious codes for legacy BIOS

  • Author

    Zhou, Zhenliu ; Luan, Haoli ; Li, Bo ; Zhu, Shidong

  • Author_Institution
    Dept. of Inf. Eng., Inst. of Eng., Shenyang, China
  • Volume
    1
  • fYear
    2010
  • fDate
    June 29 2010-July 1 2010
  • Firstpage
    77
  • Lastpage
    80
  • Abstract
    An implementation of legacy BIOS Trojan is demonstrated to attest that planting malicious codes into legacy BIOS, which can be executed during runtime of BIOS and OS, is feasible. Then vulnerabilities of legacy BIOS are analyzed. To detect above vulnerabilities and malicious codes in legacy BIOS, a security detection system for legacy BIOS is designed and implemented. This detection system can be applied to products such as Award and Phoenix BIOS.
  • Keywords
    computer network security; input-output programs; invasive software; software maintenance; legacy BIOS Trojan; malicious code; security detection system; vulnerability detection; Awards activities; Proposals; Trojan horses; Detection formatting; Legacy BIOS; Malicious Code; Vulnerability;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Communication Systems, Networks and Applications (ICCSNA), 2010 Second International Conference on
  • Conference_Location
    Hong Kong
  • Print_ISBN
    978-1-4244-7475-2
  • Type

    conf

  • DOI
    10.1109/ICCSNA.2010.5588770
  • Filename
    5588770