Malicious code detection for open firmware

被引:8
作者
Adelstein, F [1 ]
Stillerman, M [1 ]
Kozen, D [1 ]
机构
[1] ATC NY, Ithaca, NY 14850 USA
来源
18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS | 2002年
关键词
D O I
10.1109/CSAC.2002.1176312
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malicious boot firmware is a largely unrecognized but significant security risk to our global information infrastructure. Since boot firmware executes before the operating system is loaded, it can easily circumvent any operating system-based security mechanism. Boot firmware programs are typically written by third-party device manufacturers and may come from various suppliers of unknown origin. In this paper we describe an approach to this problem based on load-time verification of onboard device drivers against a standard security policy designed to limit access to system resources. We also describe our ongoing effort to construct a prototype of this technique for Open Firmware boot platforms.
引用
收藏
页码:403 / 412
页数:10
相关论文
共 24 条
[1]  
Abadi M., 1998, P 25 S PRINC PROGR L, P149
[2]  
[Anonymous], P ACM WORKSH COMP SU
[3]   A secure and reliable bootstrap architecture [J].
Arbaugh, WA ;
Farber, DJ ;
Smith, JM .
1997 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1997, :65-71
[4]  
DEAN D, 1996, P S SEC PRIV IEEE MA
[5]  
GLEW N, 1999, P 26 ACM SIGPLAN SIG, P250
[6]  
*IEEE, 1994, 12751994 IEEE
[7]  
KOZEN D, 1998, 981661 CORN U COMP S
[8]  
KOZEN D, 2002, LECT NOTES COMPUTER, V2469, P71
[9]  
LINDHOLM T, 1996, JAVA VIRTUAL MACHINE
[10]  
MORRISETT G, 1998, 25 ACM S PRINC PROGR, P85