期刊文献+

基于UEFI固件的恶意代码防范技术研究 被引量:6

Research of Malicious Code Defense Technology Based on UEFI Firmware
在线阅读 下载PDF
导出
摘要 统一可扩展固件接口(UEFI)缺乏相应的安全保障机制,易受恶意代码的攻击,而传统的计算机安全系统无法为固件启动过程和操作系统引导过程提供安全保护。针对上述问题,设计基于UEFI的恶意代码防范系统。该系统利用多模式匹配算法实现特征码检测引擎,用于在计算机启动过程中检测与清除恶意代码,并提供恶意启动项处理及系统内核文件备份等功能。实验结果证明,该系统能为固件及上层操作系统提供完善的安全保护,且代码尺寸小、检测速度快,恶意代码识别率高。 Unified Extensible Firmware futerface(UEFl) faces a grim challenges of malicious code attack. The traditional computer security software can not provide security for the firmware and operating system boot process. In order to solve the problem, this paper designs a malicious code defense system based on UEFI firmware. By using the multi-pattern matching algorithm, a signature detecting engine under UEFI environment is implemented, which provides functionally of malicious code detect, boot option analysis and firmware and operating system kernel backup. Experimental results prove that the system can effectively resist malicious code with small code size and low costs to meet the firrnware's need of flash size and fast boot.
出处 《计算机工程》 CAS CSCD 2012年第9期117-120,共4页 Computer Engineering
基金 公安部第三研究所信息网络安全公安部重点实验室开放基金资助项目
关键词 基本输入输出系统 统一可扩展固件接口 固件 恶意代码 特征码匹配 多模式匹配 Basic Input Output System(BIOS) Unified Extensible Firmware Interface(UEFI) firmware malicious code signature matching multi-pattern matching
作者简介 付思源(1987-),男,硕士研究生,主研方向:信息安全,E-mail:syfumail@gmail.com;刘功申,副教授、博士;李建华,教授、博士
  • 相关文献

参考文献8

  • 1Heasman J.Implementing and Detecting an ACPI BIOSRootkit[C]//Proc.of BLACKHAT’06.Washington D.C.,USA:[s.n.],2006.
  • 2Heasman J.Implementing and Detecting an PCI Rootkit[C]//Proc.of BLACKHAT’07.Washington D.C.,USA:[s.n.],2007.
  • 3Wojtczuk R,Rutkowska J.Attacking Intel Trusted ExecutionTechnology[C]//Proc.of BLACKHAT’09.Washington D.C.,USA:[s.n.],2007.
  • 4The Unified EFI Forum.Unified Extensible Firmware InterfaceSpecification Version 2.3.1[EB/OL].(2011-04-08).http://www.uefi.org.
  • 5Trusted Computing Group.TCG PC Specific ImplementationSpecification Version 1.1[EB/OL].(2003-08-04).http://www.trustedcomputing.org.
  • 6Zimmer V J.Platform Trust Beyond BIOS Using the UnifiedExtensible Firmware Interface[C]//Proc.of SAM’07.Las Vegas,USA:[s.n.],2007.
  • 7Zhou Zhenliu,Xu Rongsheng.BIOS Security Analysis and a Kindof Trusted BIOS[C]//Proc.of the 9th International Conference onInformation and Communications Security.Zhengzhou,China:[s.n.],2007:427-437.
  • 8Aho A V,Corasiek M J.Efficient String Matching:An Aid toBibliographic Search[J].Communications of the ACM,1975,18(6):333-343.

同被引文献30

  • 1赵琳.基于CentOS系统环境部署PXE服务[J].网络安全和信息化,2021(10):97-101. 被引量:1
  • 2周洁,谢智勇,余涵,吴荣泉.基于UEFI的国产计算机平台BIOS研究[J].计算机工程,2011,37(S1):355-358. 被引量:3
  • 3陈为军,李正明,孙俊,冯丽芳.基于U-BOOT的S3C44B0引导程序设计实现[J].微计算机信息,2007(01Z):113-115. 被引量:13
  • 4UEFI specifications[EB/OL].http://www.uefi.org/specs.
  • 5Zhou Zhenliu,Fan Jiapeng,Zhang Nan,et al.Advance and development of computer firmware security research[C]//Proceedings of the2009International Symposium on Information Processing,China,2009:258-262.
  • 6King S T,Tucek J,Cozzie A,et al.Designing and implementing malicious hardware[C]//Proceedings of the1st USENIX Workshop on Large-Scale Exploits and Emer-gent Threats,US,2008:1-8.
  • 7Heasman J.Hacking the extensible firmware interface[Z].2007.
  • 8张翠艳,张平,胡刚.基于硬件资源访问控制的固件恶意行为研究[J].计算机工程应用研究,2011,28(7):2709-2714.
  • 9Schneier B.Attack trees:modeling security threats[J].Dr Dobb’s Journal,1999,24(12):21-29.
  • 10Ray I,Poolsapassit N.Using attack trees to identify ma-licious attacks from authorized insiders[C]//Proceedings of the10th European Symposium on Research in Computer Security,Italy,2005:231-246.

引证文献6

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部